Can Mazda cars be hacked? Software flaws allow hackers to gain control of some cars via USB sticks:
Some Mazda cars could reportedly be hacked, thanks to several vulnerabilities spotted by security experts, which would allow hackers to launch automatic attacks just by inserting a USB drive into a car’s dashboard. The hacking technique was brought to light by Bugcrowd application security engineer Jay Turla, who put together a project to automate Mazda car hacks. “Mazda Connect controls a very limited number of functions within a Mazda vehicle and cannot be accessed remotely over a Wi-Fi signal, leaving any threat of hacking by USB to cause minimal damage at very worst and nothing that couldn’t be reversed. The bugs were first discovered three years ago by users of the Mazda3Revolution forum, who have since then, been “hacking” the cars to customise the vehicles’ infotainment systems and install new apps, BleepingComputer reported. From the vehicle standpoint, Mazda Connect can control limited vehicle feature settings, such as keyless entry, what information is shown on the Active Driving Display, when the vehicle reacts to lane departure, etc. However, Mazda has fixed the USB attack loophole and confirmed that the vulnerabilities cannot be used to conduct malicious attacks. ” It was curiosity that led Turla to finding ways to hack Mazda cars. “Unfortunately, today, because there are so many more computer-controlled features and the vehicles are connected to the internet we have a perfect storm of vulnerability,” Dahnert added. ” Turla’s attack is based on Mazda’s MZD-AIO-TI (MZD All In One Tweaks Installer) tool. According to Turla, the flaws can also allow hackers to install RATs (Remote Access Trojans) into the vehicle’s system.
Facebook security breach saw personal details of $15-an-hour moderators exposed to Isis members:
The software bug, which was active for a month, caused the personal profiles of moderators to show up in the activity logs for the groups they had shut down. Last year, we learned that the names of certain people who work for Facebook to enforce our policies could have been viewed by a specific set of Group admins within their admin activity log. As a result of the bug, Facebook identified that seven members of an Egypt-based group that supports Hamas and Isis had viewed the personal profiles of six of the moderators in the counter terrorism unit. Moderators living in fear for their lives “You come in every morning and just look at beheadings, people getting butchered, stoned, executed,” one of the six affected moderators told the Guardian. Many of these moderators routinely have to shut down private Facebook groups featuring inappropriate content, and they are required to use their personal profiles to log into their accounts. This included determining exactly which names were possibly viewed and by whom, as well as an assessment of the risk to the affected person,” a Facebook spokesperson told . A security flaw in the moderation software exposed the personal Facebook profiles of employees from 22 departments whose job is to routinely review and remove inappropriate posts, images and videos from the social network, including pornography, hate speech and extremist propaganda. “Our investigation found that only a small fraction of the names were likely viewed, and we never had evidence of any threat to the people impacted or their families as a result of this matter. Facebook has suffered a major security breach, exposing the personal details of over 1,000 content moderators to people known to support terrorist organisations.
New PayPal phishing scam: How to stay safe from the fake payment ring:
Once users enter their logins the phisher asks for more details including the user’s card details and the picture of their ID card. A new PayPal phishing campaign has emerged, which redirects users to a site controlled by hackers showing a fake PayPal login page. Security researchers from PhishMe say hackers are relying on spam emails to drive users towards this PayPal phishing page hosted on a compromised WordPress site from New Zealand. Users are being tricked into giving away their PayPal credentials, payment card details, and most significantly a selfie holding their ID card. As for the phishing technique, a similar tactic of uploading a selfie while holding an ID card was seen in October 2016, when McAfee discovered a variant of the Acecard Android banking trojan. It too asked users to upload their selfies when logging into their mobile banking accounts. com is the correct domain and everything else is likely a fake page. If there is a time countdown not amounting to days but hours or minutes it is likely to be a phishing attempt. Pay Pal was hit by a phishing scam earlier this year when users were tricked into giving their social security numbers. The company after its last phishing scam has said they only address users by their full names.
What is CherryBlossom? Wikileaks says hacking tool used by CIA to spy on WiFi routers for years:
Wikileaks in its latest dump has revealed yet another spying tool used by the CIA, which it claims was created to intercept WiFi routers and was being used for years, Named CherryBlossom, the project was allegedly developed and implemented with the help of the US nonprofit Stanford Research Institute (SRI International) for monitoring online activity and evaluating software exploits of targets that could be used as a weapon later. The CherryBlossom firmware requires no physical access to the targeted device and once in, the administrator can scan for email addresses, chat usernames as well as VoIP numbers that pass through the network. It particularly focused on wireless devices like routers and access points to gain access to user systems. The latest documents are part of an ongoing series of leaks released by WikiLeaks, revealing the work of the CIA’s elite hacking unit, dubbed the Engineering Development Group. Among the dump are scores of files with user manuals and other “secret”-marked maps and charts revealing several hacking tool suites, which allowed the agency to target individual and networks. Once the network is accessed, the administrator can easily monitor, control and manipulate the Internet traffic of connected users. Wi-Fi devices used in homes, public spaces, small- and medium-sized companies as well as enterprise offices were all part of the project. The malicious codes can also be injected into the stream to exploit vulnerabilities in applications or the operating system as a whole.
GCHQ cyber cops believe North Korea was behind WannaCry attacks:
The NCSC, along with the NSA, as well as several cybersecurity firms blame the attacks on a North Korean hacker group called Lazarus. The North Korean hacker group has also been tied to the massive Bangladesh Bank hack, which saw $81m stolen by hackers. Security experts have previously linked the Lazarus group to a series of cyberattacks across the globe. The criminality and cyber attacks also have the added bonus of enabling North Korea to undermine the very international economic and political systems that constrain and punish it,” cybersecurity firm Recorded Future said in an analysis of the hermit kingdom’s activities. “Despite the Lazarus group being linked to North Korea, the role of Pyonyang’s leadership in directing the attacks still remains unclear. “In this context, criminality, terrorism, and destructive cyber attacks all fit within the North Korean asymmetric military strategy which emphasizes surprise attacks and mixed tactics. Britain’s cyber cops reportedly believe that last month’s global ransomware attacks, which hit the NHS as well as numerous organisations across the world, was launched by North Korea. Some experts believe that the hermit kingdom’s much publicised cyber army primarily functions as a money-making unit, even as North Korea’s economy faces numerous international sanctions. More recently, the experts have linked the group to a slew of bank hacks across the globe. The NCSC came to the conclusion that the Lazarus group was behind the WannaCry attacks as part of their own probe into the incident.
Xavier data stealing Android malware found inside 800 apps on Google Play:
According to researchers at Trend Micro, who detected the threat, Xavier is capable of downloading and executing other malicious codes, as well as stealing users’ personal and financial data. The malware also uses security evasion techniques such as “String encryption, Internet data encryption, and emulator detection” to avoid being detected by security and anti-virus programs. Over 800 Android apps on Google Play were found infected with a “silent” data stealing and leaking malware. Google has begun removing malicious apps from Google Play and 75 Xavier infected apps have already been removed from the Play Store. “Xavier’s stealing and leaking capabilities are difficult to detect because of a self-protect mechanism that allows it to escape both static and dynamic analysis,” researchers said. Researchers said that these infected apps have already been downloaded millions of times. Apart from stealing and leaking user data, the malware can also install APKs on rooted devices. In most cases, malware-infected apps come from third-party sites. Other users can be a great source of insights, especially if they can point out whether a specific application exhibits suspicious behaviour,” Trend Micro researchers said. “The greatest number of download attempts came from countries in Southeast Asia such as Vietnam, Philippines, and Indonesia, with fewer downloads from the United States and Europe,” researchers said.
University College London computer network held to ransom in cyberattack:
A leading university in London is fighting to regain control of its computer networks after a strain of ransomware infected it systems this week (14 June. UCL said the ransomware infected a number of user’s personal and shared drives, also known as N (Network) and S (Shared) drives. On 15 June, UCL said in an update it had no reports of the unidentified ransomware infecting Mac or Linux machines. Experts from University College London (UCL) said initial analysis suggested the malware was part of a “zero-day attack”, when software targets a previously-unknown vulnerability, because the standard “virus checkers” did not show any suspicious activity during infection. UCL’s information Security team is actively working with the affected users to identify the source of the infection and to quarantine their machines and file-stores. “This – combined with a reluctance to invest in cybersecurity and overworked and underfunded IT departments – leads to an environment in which ransomware attacks can and have flourished. Doing so may lead to loss of your data and very substantial disruption to the university. ” Thomas Fischer, threat researcher at Digital Guardian, a cybersecurity firm, believes universities have become “easy targets” of ransomware attacks. If any email is unexpected or in any way suspicious then you must not open any attachment or follow any link in the email. A UCL statement read: “We apologise for the obvious impact this will have across the university but it is important that we act quickly to reduce the further spread of this malware.
This is the sick new way scammers are trying to hack your computer:
Use your phone to pay it,” the note reads. Security researchers have uncovered a sick new form of computer-locking ransomware that lures in victims by posing as an appeal to help starving toddlers. Researchers found the ransomware targets dozens of file types, including 7z, mp3, mp4, jpg, zip and rar. The variant first came to light this week (12 June) after the ransom demand was uploaded to ID-Ransomware, an online platform which helps identify known malware strains. With a note titled ‘Save Children’, the malware will encrypt personal files and demand cryptocurrency for their return. “It’s bad enough that these developers are hurting people and their business by encrypting their files, but to spout complete BS while taking advantage of the horrible misfortunes of others to earn money is just disgusting,” Abrams wrote in a post on Bleeping Computer this week. cerber6 extension, a reference to the particularly nasty form of ransomware with the same name. Your important files are encrypted. After encryption takes place, file names are scrambled and changed to have a. Experts admit ransomware is often difficult to combat as it spreads in a variety of ways, mainly via attachments in phishing emails.
Nearly 100% of students would give away a friend’s online privacy for a free pizza:
The analysis found the “incentivised condition has a large, negative effect on the probability that students will protect the privacy of their friends relative to their behaviour in the non-incentivised condition. The majority of students are willing to sacrifice their friends’ private email addresses in exchange for free pizza, according to a study of 3,108 Massachusetts Institute of Technology (MIT) students. They used a randomised 50% sample where students would be asked for details of their close friends, with the test trying find out if they protected the privacy of their buddies by handing over fake information, or if the lure of the margarita was just too strong. “As more of our lives are becoming digital, making sure we have control over how and when our data is used will become more important over time,” he added. ” It found that 98% of students in the incentivised sample handed over the credentials when promised pizza. highlight how small incentives such as a cheese pizza can have a large effect on decisions about privacy,” the study’s working paper concluded. It also said “irrelevant, but reassuring\” information about privacy protection makes people less likely to avoid surveillance. Christian Catalini, one of three authors of the study, told Market Watch: “[It is] important to rethink how consent is given in all these applications, mostly to make sure that consumers are actually making a choice consistent with their preferences. Whereas people say they care about privacy, they are willing to relinquish private data quite easily when incentivised to do so,” the study’s authors found. List three friends you would like to share a pizza with.
Millions of Samsung users were at risk of being hacked after firm forgot to renew domain:
The firm said that taking control of the domain would “not allow you to install malicious apps, it does not allow you to take control of users’ phones. Security experts said that hackers could have potentially taken control of the domain to install a backdoor or distribute malware-laced apps directly to scores of Samsung users. Millions of Samsung users were reportedly left vulnerable to hackers after the popular smartphone manufacturer allowed a domain to expire, which was used to control a popular stock app on older models. The domain in question was used to control a popular stock app called S Suggest, which came pre-installed in older model Samsung phones, Motherboard reported. Gouveia said that the domain had several permissions, including installing apps or rebooting devices, which could have potentially been abused by hackers. ” However, Samsung users are currently safe from being targeted by hackers, since the domain is now under Gouveia’s control. However, Gouveia’s claims were backed up by another independent security researcher, Ben Actis, who said that if the domain had been taken over by a hacker, millions of Samsung devices could have been vulnerable to backdoors and malicious apps. Actis also said that “someone malicious could install whatever they wanted”, after Samsung allowed the domain to expire. The researcher said that he would be willing to give the domain back to Samsung. It is also uncertain as to how long the domain was left adrift before it was snapped up by Gouveia.