Weekend news review: August 4-8

"Android malware SandroRAT disguised as mobile security app"

"Android malware SandroRAT disguised as mobile security app"

Users were lured by phishing emails, which supposedly contained a free Kaspersky mobile security app. <a style="color: #FFFFFF" href="http://bit.ly/1tSDPfH" target="_blank">Read more</a>
"Script fails, thousands of Mozilla developer emails, passwords possibly exposed"

"Script fails, thousands of Mozilla developer emails, passwords possibly exposed"

The script for a data sanitization process on the Mozilla Developer Network failed and the email addresses and passwords of thousands of users was publicly accessible. <a style="color: #FFFFFF" href="http://bit.ly/1pABQbJ" target="_blank">Read more</a>
"PayPal addressing another two-factor authentication bypass"

"PayPal addressing another two-factor authentication bypass"

An Australian researcher has discovered and posted a method for getting past PayPal's two-factor authentication, but it requires primary credentials. <a style="color: #FFFFFF" href="http://bit.ly/1oMNP6I" target="_blank">Read more</a>
"NIST drafts updated guidance for agencies assessing security, privacy"

"NIST drafts updated guidance for agencies assessing security, privacy"

The guidance gives federal agencies improved assessment procedures for securing their information systems and networks. <a style="color: #FFFFFF" href="http://bit.ly/1zTZEfm" target="_blank">Read more</a>
"Black Hat keynote talks cyber policies for field's future"

"Black Hat keynote talks cyber policies for field's future"

On Wednesday, Dan Geer delivered his keynote called "Cybersecurity as Realpolitik" at Black Hat. <a style="color: #FFFFFF" href="http://bit.ly/1mq7KE8" target="_blank">Read more</a>
"Black Hat: Researcher demonstrates how he controlled room devices in luxury hotel"

"Black Hat: Researcher demonstrates how he controlled room devices in luxury hotel"

An insecure home automation protocol allowed the hacker to control room amenities, like lights, TVs and temperature settings. <a style="color: #FFFFFF" href="http://bit.ly/1kOZcMg" target="_blank">Read more</a>
"Black Hat: Hidden controls open 2 billion mobile devices to exploitation"

"Black Hat: Hidden controls open 2 billion mobile devices to exploitation"

A pair of researchers from Accuvant at the 2014 Black Hat conference showed how the OMA-DM protocol can be leveraged to gain access to mobile devices. <a style="color: #FFFFFF" href="http://bit.ly/1pEonQ9" target="_blank">Read more</a>
"Black Hat: Airport security equipment at risk"

"Black Hat: Airport security equipment at risk"

Bugs in trace detection scanners, x-ray machines and time and attendance clocks could make them vulnerable to attack, according to experts at this year's Black Hat conference. <a style="color: #FFFFFF" href="http://bit.ly/1B0ZZhC" target="_blank">Read more</a>
DefCon: Traffic control systems vulnerable to hacking

DefCon: Traffic control systems vulnerable to hacking

Cesar Cerrudo spoke at DefCon about how traffic control systems used in the U.S. and other countries can be hacked. <a style="color: #FFFFFF" href="http://bit.ly/1rayJXf" target="_blank">Read more</a>

This week's news centers around our coverage of Black Hat in Las Vegas. In one session, a researcher detailed how he learned to control hotel rooms devices. In another, airport security devices' vulnerabilites were discussed. For a closer look at these articles, click here to visit our news section.

More Slideshows

Topics:

You must be a registered member of SC Media US to post a comment.