New Attacks Against 4G, 5G Mobile Networks Re-Enable IMSI Catchers

Posted on March 1st, 2019 by Responsible Cyber

At NDSS Symposium 2019, a group of university researchers yesterday revealed newly discovered cellular network vulnerabilities that impact both 4G and 5G LTE protocols.According to a paper published by the researchers, “Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information,” the new attacks could allow remote attackers to bypass security […]

Read More

Hacking Virtual Reality – Researchers Exploit Popular Bigscreen VR App

Posted on March 1st, 2019 by Responsible Cyber

A team of cybersecurity researchers from the University of New Haven yesterday released a video demonstrating how vulnerabilities that most programmers often underestimate could have allowed hackers to evade privacy and security of your virtual reality experience as well as the real world.According to the researchers—Ibrahim Baggili, Peter Casey and Martin Vondráček—the underlying vulnerabilities, technical […]

Read More

Severe Flaws in SHAREit Android App Let Hackers Steal Your Files

Posted on March 1st, 2019 by Responsible Cyber

Security researchers have discovered two high-severity vulnerabilities in the SHAREit Android app that could allow attackers to bypass device authentication mechanism and steal files containing sensitive from a victim’s device.With over 1.5 billion users worldwide, SHAREit is a popular file sharing application for Android, iOS, Windows and Mac that has been designed to help people […]

Read More

New Flaws Re-Enable DMA Attacks On Wide Range of Modern Computers

Posted on March 1st, 2019 by Responsible Cyber

Security researchers have discovered a new class of security vulnerabilities that impacts all major operating systems, including Microsoft Windows, Apple macOS, Linux, and FreeBSD, allowing attackers to bypass protection mechanisms introduced to defend against DMA attacks.Known for years, Direct memory access (DMA)-based attacks let an attacker compromise a targeted computer in a matter of seconds […]

Read More

Elasticsearch clusters face attacks from multiple hacker groups

Posted on February 28th, 2019 by Responsible Cyber

Security researchers have recently detected an increased number of attacks against Elasticsearch clusters running older versions with known vulnerabilities. At least six different groups of attackers are searching for and exploiting insecure deployments to abuse servers. Elasticsearch is a distributed search engine platform written in Java designed for processing large data sets. It is commonly […]

Read More

Attackers place cryptojacking apps in the Microsoft App Store

Posted on February 20th, 2019 by Responsible Cyber

In January, security researchers from Symantec found cryptomining applications in the Microsoft App Store, but they were published in the store between April and December 2018. It’s not clear how many users downloaded or installed the apps, but they had almost 1,900 user ratings. The rogue applications posed as browsers, search engines, YouTube video downloaders, […]

Read More

Valentine’s Emails Laced with Gandcrab Ransomware

Posted on February 15th, 2019 by Responsible Cyber

In the weeks leading up to Valentine’s Day 2019, researchers notice a new form of Gandcrab appearing in romance-themed emails. Hackers love the holidays, and Valentine’s Day is no exception. Some cybercriminals currently are spreading the love, with a new form of Gandcrab ransomware sliding into target inboxes. In the weeks preceding February 14, Mimecast […]

Read More

Researchers Implant “Protected” Malware On Intel SGX Enclaves

Posted on February 13th, 2019 by Responsible Cyber

Cybersecurity researchers have discovered a way to hide malicious code in Intel SGX enclaves, a hardware-based memory encryption feature in modern processors that isolates sensitive code and data to protect it from disclosure or modification.In other words, the technique allows attackers to implant malware code in a secure memory that uses protection features of SGX […]

Read More

‘Picnic’ Passes Test for Protecting IoT From Quantum Hacks

Posted on February 13th, 2019 by Responsible Cyber

Researchers from DigiCert, Utimaco, and Microsoft Research gives thumbs-up to a new algorithm for implementing quantum hacking-proof digital certificates. Researchers at DigiCert, Utimaco, and Microsoft Research this week announced the successful test of a newly created algorithm named “Picnic,” with digital certificates used to encrypt, authenticate, and provide integrity for Internet of Things (IoT) devices. The […]

Read More

Popular electric scooters can be remotely hacked

Posted on February 12th, 2019 by Responsible Cyber

Beware, Xiaomi M365 scooters riders, as security researchers say the scooters can be remotely hacked from up to 100 meters away to slam on the brakes or to accelerate. Security researchers from Zimperium’s zLabs published a video showing their proof-of-concept (PoC) capable of disabling the scooter. In the PoC, the attacker connects to the scooter […]

Read More