NATO experimented with deceptive techniques to combat Russian hackers

During a cyber exercise in Estonia on November 16-20, NATO experts experimented with deceptive techniques – they practiced in catching Russian government-funded hackers using specially placed traps. The exercise, coordinated by the Cyber Security Training Centre of the Estonian Ministry of Defence, was attended by 1,000 people. Whereas previous exercises were aimed at imitating hybrid… Continue reading NATO experimented with deceptive techniques to combat Russian hackers

The researcher showed how to steal a Tesla Model X in a few minutes

Information security specialist Lennert Wouters from the Catholic University of Leuven showed how to steal a Tesla Model X. He discovered a bug that allowed hacking and changing the firmware of the Tesla Model X smart key fob. As a result, this attack made it possible to steal someone else’s car in a few minutes.… Continue reading The researcher showed how to steal a Tesla Model X in a few minutes

LidarPhone attack will make your vacuum cleaner spy on you

A group of scientists from the University of Maryland and the National University of Singapore have demonstrated the LidarPhone attack, which can turn a smart vacuum cleaner into a spy device that records conversations nearby. As the name suggests, the attack relies on the device’s built-in lidar, which the vacuum cleaner uses to navigate space.… Continue reading LidarPhone attack will make your vacuum cleaner spy on you

Cybercriminals started using Google services more often in phishing campaigns

Security researchers have reported an increase in cyberattacks using Google services in phishing campaigns, as a tool to bypass security and steal credentials, credit cards, and other personal information. The Armorblox team analysed five phishing campaigns, which they call the “the top of the deep iceberg”. The attacks exploit features of several Google services, including… Continue reading Cybercriminals started using Google services more often in phishing campaigns

Though 2020 is ending, the list of worst passwords is still topes “123456”

Example of weak password

The end of the year is approaching, and the developers of the password manager NordPass have once again published a list of the most popular and weak passwords of 2020. The worst password in 2020 is still the same “123456”. Unfortunately, over the past 12 months, password security hasn’t improved at all. To compile the… Continue reading Though 2020 is ending, the list of worst passwords is still topes “123456”

Chrome 87 Fixed NAT Slipstream Vulnerability and Disabled FTP Support

Google engineers introduced Chrome 87, in which was disabled FTP support. The new version of the browser is already available for users of Windows, Mac, Linux, Chrome OS, Android and iOS. The developers claim that Chrome has become more productive and “lighter”. So, due to the limitation of JavaScript timers and a number of other… Continue reading Chrome 87 Fixed NAT Slipstream Vulnerability and Disabled FTP Support

VoltPillager attack compromises Intel SGX

A group of researchers from the University of Birmingham have demonstrated the VoltPillager attack, which can violate the confidentiality and integrity of data in Intel SGX enclaves. To implement this, the researchers learned to manipulate the processor core voltage. Let me remind you that with the release of the Skylake architecture, Intel introduced a technology… Continue reading VoltPillager attack compromises Intel SGX

Microsoft accused Russia and North Korea of attacks on pharmaceutical companies

Microsoft representatives accused Russia and North Korea of attacks on pharmaceutical companies. They reported that, according to their data, in recent months, three APT groups have attacked at least seven companies engaged in COVID-19 research and vaccine development. Two global issues will help shape people’s memories of 2020: Covid-19 and the increased exploitation of the… Continue reading Microsoft accused Russia and North Korea of attacks on pharmaceutical companies

CostaRicto mercenary hackers target financial institutions around the world

BlackBerry experts told about the discovery of a group of mercenary hackers called CostaRicto. This is the fifth group of mercenary hackers identified by experts this year. So, back in the spring, Google Threat Analysis Group experts warned that the number of such groups is growing, and earlier this year, information security specialists have already… Continue reading CostaRicto mercenary hackers target financial institutions around the world

Microsoft urges users to opt out of multi-factor authentication via phone

Microsoft experts have once again raised the issue of the insecurity of multi-factor authentication through the phone, that is, through one-time codes in SMS messages or voice calls. Instead, the company is calling for newer technologies, including authenticator applications and security keys. This time, the warning comes from the company’s head of identity security, Alex… Continue reading Microsoft urges users to opt out of multi-factor authentication via phone