Maliciously Tampering with Medical Imagery

Posted on April 13th, 2019 by Responsible Cyber

In what I am sure is only a first in many similar demonstrations, researchers are able to add or remove cancer signs from CT scans. The results easily fool radiologists. I don’t think the medical device industry has thought at all about data integrity and authentication issues. In a world where sensor data of all […]

Read More

Adversarial Machine Learning against Tesla’s Autopilot

Posted on April 6th, 2019 by Responsible Cyber

Researchers have been able to fool Tesla’s autopilot in a variety of ways, including convincing it to drive into oncoming traffic. It requires the placement of stickers on the road. Abstract: Keen Security Lab has maintained the security research work on Tesla vehicle and shared our research results on Black Hat USA 2017 and 2018 […]

Read More

New MageCart Attacks Target Bedding Retailers My Pillow and Amerisleep

Posted on March 24th, 2019 by Responsible Cyber

Cybersecurity researchers today disclosed details of two newly identified Magecart attacks targeting online shoppers of bedding retailers MyPillow and Amerisleep.Magecart is an umbrella term researchers gave to at least 11 different hacking groups that are specialized in implanting malware code on e-commerce websites with an intent to steal payment card details of their customers silently.Magecart […]

Read More

Researchers Link ‘Sharpshooter’ Cyber Attacks to North Korean Hackers

Posted on March 14th, 2019 by Responsible Cyber

Security researchers have finally, with “high confidence,” linked a previously discovered global cyber espionage campaign targeting critical infrastructure around the world to a North Korean APT hacking group.Thanks to the new evidence collected by researchers after analyzing a command-and-control (C2) server involved in the espionage campaign and seized by law enforcement.Dubbed Operation Sharpshooter, the cyber […]

Read More

Digital Signatures in PDFs Are Broken

Posted on March 14th, 2019 by Responsible Cyber

Researchers have demonstrated spoofing of digital signatures in PDF files. This would matter more if PDF digital signatures were widely used. Still, the researchers have worked with the various companies that make PDF readers to close the vulnerabilities. You should update your software. Details are here. News article. Tags: academic papers, signatures, spoofing, vulnerabilities Go […]

Read More

New Attacks Against 4G, 5G Mobile Networks Re-Enable IMSI Catchers

Posted on March 1st, 2019 by Responsible Cyber

At NDSS Symposium 2019, a group of university researchers yesterday revealed newly discovered cellular network vulnerabilities that impact both 4G and 5G LTE protocols.According to a paper published by the researchers, “Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information,” the new attacks could allow remote attackers to bypass security […]

Read More

Hacking Virtual Reality – Researchers Exploit Popular Bigscreen VR App

Posted on March 1st, 2019 by Responsible Cyber

A team of cybersecurity researchers from the University of New Haven yesterday released a video demonstrating how vulnerabilities that most programmers often underestimate could have allowed hackers to evade privacy and security of your virtual reality experience as well as the real world.According to the researchers—Ibrahim Baggili, Peter Casey and Martin Vondráček—the underlying vulnerabilities, technical […]

Read More

Severe Flaws in SHAREit Android App Let Hackers Steal Your Files

Posted on March 1st, 2019 by Responsible Cyber

Security researchers have discovered two high-severity vulnerabilities in the SHAREit Android app that could allow attackers to bypass device authentication mechanism and steal files containing sensitive from a victim’s device.With over 1.5 billion users worldwide, SHAREit is a popular file sharing application for Android, iOS, Windows and Mac that has been designed to help people […]

Read More

New Flaws Re-Enable DMA Attacks On Wide Range of Modern Computers

Posted on March 1st, 2019 by Responsible Cyber

Security researchers have discovered a new class of security vulnerabilities that impacts all major operating systems, including Microsoft Windows, Apple macOS, Linux, and FreeBSD, allowing attackers to bypass protection mechanisms introduced to defend against DMA attacks.Known for years, Direct memory access (DMA)-based attacks let an attacker compromise a targeted computer in a matter of seconds […]

Read More

Elasticsearch clusters face attacks from multiple hacker groups

Posted on February 28th, 2019 by Responsible Cyber

Security researchers have recently detected an increased number of attacks against Elasticsearch clusters running older versions with known vulnerabilities. At least six different groups of attackers are searching for and exploiting insecure deployments to abuse servers. Elasticsearch is a distributed search engine platform written in Java designed for processing large data sets. It is commonly […]

Read More