Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Security of third-pa ...

 Technology

Any modern car is basically a computer on wheels. And many are also connected to the internet. As a result, in addition to the vehicles themselves, automakers are now developing apps to control them remotely. These can be used to check the cars location, turn on the heating or air conditioning in advance, lock and   show more ...

unlock the doors, and so on. However, different users have very different needs, and its not possible to squeeze all features into one app. So, besides the software from automakers, there are also third-party apps for every taste and wallet. Sure, its convenient. But is it safe? Our researchers decided to investigate… Whos driving your car? For the car to know its really you using the app, you need to enter a username and password. If you use the car makers own app, your credentials dont get passed to a third party, which is a good thing. And there are security standards for car manufacturers that their products must meet. If you choose a third-party app with some unique features lacking in the official app, it somehow needs access to the vehicle or its telemetry data. Some apps use solutions specially developed by the automaker for this purpose, which do not require your credentials and are given limited access to the vehicle, allowing you to use their functionality but preventing them from doing dangerous things like unlocking the doors. These apps are more or less secure, but still few in number. Most connected cars apps require the username and password for your account with the manufacturer; that is, they get full access to your account. At the same time, the security requirements that apply to automakers do not extend to these apps, and this is where the problem arises. Trust is everything The studys main focus was on the third-party mobile apps that use the vehicle owners account with the manufacturer. Unfortunately, more than half of app developers do not warn of the risks of handing over the account. Those who do warn the users, assure that they either wont store the credentials at all, or store them in encrypted form. Some of them emphasize that the username and password are needed only in order to obtain an authorization token. However, a token allows anyone to use the account on your behalf, just like with your login credentials, and it too could be leaked if stored improperly. Whats more, theres no way to check how your credentials are actually handled: you either trust the developers or you dont use the app. In addition, the developers of 14% of the apps that our researchers investigated proved impossible to contact in case of problems: the contact details on their websites were either missing or pointed to deleted social media pages. Its a similar situation with web services: the user hands over their credentials without knowing for sure how theyll be stored and processed. Open-source solutions are more transparent in this respect: tech-savvy users can at least study the code. However, for regular folks without a technical background, itll be extremely difficult to figure it out. Another problem is that there also exist intermediary services that link up the automakers systems to third-party apps. These are used by developers of car apps and web services, but may be something that users have no inkling about whatsoever. And its important to understand that if your chosen third-party automotive app works through an intermediary service, the developers of both will get hold of your credentials. Third-party apps accessing your car: whats the risk? If your credentials arent stored very securely, intruders can get to them. They probably wont manage to steal your car, but they can remote-control the various systems: doors and windows, climate control, horn, headlights, etc. If an intruder starts honking or flashing lights randomly while youre driving, it can be unpleasant, if not downright dangerous. This might seem like a James Bond-type scenario: who on earth would want to do away with you in such an elaborate manner? But if such data were to leak into the public domain, it could fall into the hands of online pranksters anywhere in the world, of which are plenty, who just want to have fun and dont even realize what the consequences might be. Besides, if an app is hacked, the attackers will have access to all the collected data, including geolocation. And this can be used to track the movements of car owners — again, from anywhere in the world. Heres a recent example. Not long ago, 19-year-old security expert David Colombo accidentally discovered a vulnerability in the TeslaMate app for collecting, storing and visualizing telemetry data from Tesla vehicles. He managed to find out where the car owners lived, where they drove and at what speed, where the vehicles were parked, where they were charged, and what updates were installed on those cars. Although the app itself was designed to just to collect data — not control the car, Colombo managed to do just that. And all because the storage containing the users credentials was accessible with the default password, while some information could be retrieved with no authorization at all. Colombo reported the issue to the app developers and they fixed it relatively quickly. Despite the happy ending, the story shows that third-party car apps may not be as reliable as the devs claim. So, should I stop using third party apps? All this is not to say that third-party apps should never be used in any circumstances. By no means all developers are indifferent to user data security. As we observed, TeslaMates creators responded rather quickly to the vulnerability report and fixed the issue. And, as mentioned, there are apps that do not require full access to your account with the automaker. That said, if you want to use features lacking in your vehicles native app, be careful when choosing: if possible, choose an app from a reliable developer, which at the very least doesnt hide its contact details and respects the concept of transparency. Look for reports by security experts and feedback from tech-savvy users who understand how it all works and what the risks are. If youre already using a third-party app but want to stop, note that simply uninstalling it from your smartphone may not be enough… Check if you also need to unsubscribe or delete your account with the service; Just in case, change the password for your account with the automaker; If possible, revoke the apps access to your account through the manufacturers website or technical support.

image for Episode 238: Robots  ...

 Aethon

In this episode of the podcast (#238) we speak with Daniel Brodie, the CTO at the firm Cynerio. about his firm’s discovery of a string of critical security flaws in an autonomous medical robot, TUG, that is already deployed in hundreds of clinical settings and the growing issue of medical device insecurity and   show more ...

cyber risks to healthcare...Read the whole entry... » Click the icon below to listen. Related StoriesEpisode 235: Justine Bone of MedSec on Healthcare InsecurityFeel Good Ukraine Tractor Story Highlights Ag Cyber RiskCyber Attack Halts Production at Ag Equipment Maker AGCO Fendt

 Govt., Critical Infrastructure

The U.S. is setting up a Joint Ransomware Task Force, headed by the CISA and the FBI, as well as two international initiatives, chaired by the Department of Justice, to tackle illegal cryptocurrency activities related to ransomware.

 Threat Actors

The cybercrime operation states that it does not use any ransomware and focuses on network infiltration by abusing vulnerabilities. The attackers focus primarily on data exfiltration and do not build any encryption modules.

 Govt., Critical Infrastructure

In her testimony to a House committee, Army Secretary Christine Wormuth asserted that the service must work to close its “vulnerability gap,” explaining that the army has learned valuable lessons from the Russian invasion of Ukraine.

 Geopolitical, Terrorism

Russia — a nation that has famously been on the offensive when it comes to cyberattacks — is now facing its own barrage of hacks as multiple sanctions hit the country from the West.

 Companies to Watch

The Series B funding for Nisos, the managed intelligence service provider, was led by global cyber investor Paladin Capital Group, alongside existing investors Columbia Capital and Skylab Capital.

 Breaches and Incidents

Cyble researchers spotted a malware campaign targeting the infoSec community via a fake PoC exploit code for RPC Runtime RCE flaw. The fake exploit was distributed via GitHub. By attacking the infosec community, attackers are probably trying to gain access to vulnerability research or steal other proprietary data. As a precaution, security researchers should stay alert and be aware of such attacks.

 Malware and Vulnerabilities

The critical security hole, tracked as CVE-2022-1853, has been described as a use-after-free bug affecting Indexed DB. Google learned about it on May 12 and it has yet to determine the bug bounty for this vulnerability.

 Trends, Reports, Analysis

In addition to the increase in ransomware breaches, the Verizon Business 2022 DBIR report also found that 82% of cyber breaches involved the human element, including social attacks, errors, and misuse.

 Malware and Vulnerabilities

The malware injection leverages the #psigate_cc_number, #psigate_expiration, #psigate_expiration_yr and #psigate_cc_cid fields (among others) to harvest customer’s payment data and details whenever the text fields are submitted on the checkout page.

 Feed

The print spooler service can be abused by an authenticated remote attacker to load a DLL through a crafted DCERPC request, resulting in remote code execution as NT AUTHORITYSYSTEM. This module uses the MS-RPRN vector which requires the Print Spooler service to be running.

 Feed

Red Hat Security Advisory 2022-2283-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.9.35.

 Feed

Ubuntu Security Notice 5404-2 - USN-5404-1 addressed a vulnerability in Rsyslog. This update provides the corresponding update for Ubuntu 16.04 ESM. Pieter Agten discovered that Rsyslog incorrectly handled certain requests. An attacker could possibly use this issue to cause a crash.

 Feed

Red Hat Security Advisory 2022-4729-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 91.9.1 ESR.

 Feed

Popular video conferencing service Zoom has resolved as many as four security vulnerabilities, which could be exploited to compromise another user over chat by sending specially crafted Extensible Messaging and Presence Protocol (XMPP) messages and execute malicious code. Tracked from CVE-2022-22784 through CVE-2022-22787, the issues range between 5.9 and 8.1 in severity. Ivan Fratric of Google

 Feed

A group of academics has devised a system that can be used on a phone or a laptop to identify and locate Wi-Fi-connected hidden IoT devices in unfamiliar physical spaces. With hidden cameras being increasingly used to snoop on individuals in hotel rooms and Airbnbs, the goal is to be able to pinpoint such rogue devices without much of a hassle. The system, dubbed Lumos, is designed with this

 Feed

If one word could sum up the 2021 infosecurity year (well, actually three), it would be these: "supply chain attack".  A software supply chain attack happens when hackers manipulate the code in third-party software components to compromise the 'downstream' applications that use them. In 2021, we have seen a dramatic rise in such attacks: high profile security incidents like the SolarWinds,

 Feed

Malicious actors can gain unauthorized access to users' online accounts via a new technique called "account pre-hijacking," new research has found. The attack takes aim at the account creation process that's ubiquitous in websites and other online platforms, enabling an adversary to perform a set of actions before an unsuspecting victim creates an account in a target service. The study was led

 Feed

An unknown advanced persistent threat (APT) group has been linked to a series of spear-phishing attacks targeting Russian government entities since the onset of the Russo-Ukrainian war in late February 2022. "The campaigns [...] are designed to implant a Remote Access Trojan (RAT) that can be used to surveil the computers it infects, and run commands on them remotely," Malwarebytes said in a

 Feed

Security incidents occur. It's not a matter of "if," but of "when." That's why you implemented security products and procedures to optimize the incident response (IR) process. However, many security pros who are doing an excellent job in handling incidents find effectively communicating the   show more ...

ongoing process with their management a much more challenging task. Feels familiar? In many organizations,

 Feed

A year-long international investigation has resulted in the arrest of the suspected head of the SilverTerrier cybercrime group by the Nigeria Police Force. "The suspect is alleged to have run a transnational cybercrime syndicate that launched mass phishing campaigns and business email compromise schemes targeting companies and individual victims," Interpol said in a statement. <!--adsense-->

2022-05
Aggregator history
Wednesday, May 25
SUN
MON
TUE
WED
THU
FRI
SAT
MayJuneJuly