Source: National Cyber Security – Produced By Gregory Evans After years of debate on whether to give the FBI and other federal agencies the tools to bypass smartphone security, it appears we are still light-years away from any resolution. There was a moment a few months ago when proposed legislation…
RESEARCHERS SOLVE JUNIPER BACKDOOR MYSTERY; SIGNS POINT TO NSA
Source: National Cyber Security – Produced By Gregory Evans “Although the party behind the Juniper backdoor could be the NSA or an NSA spying partner like the UK or Israel, news reports last week quoted unnamed US officials saying they don’t believe the US intelligence community is behind it, and…
Apple may face fines as it is refusing backdoor access to data
United States may fine Apple for refusing to create backdoor for data access Apple may face problems same as Yahoo faced in 2007 when it refused to participate in the PRISM program,which set a precedent for non-compliance with government demands. Apple may get in deep trouble as it has refused…
New backdoor worm found attacking websites running Apache Tomcat
Researchers have identified new self-replicating malware that infects computers running the Apache Tomcat Web server with a backdoor that can be used to attack other machines. Java.Tomdep, as the backdoor worm has been dubbed, is Java Servlet-based code that gives Apache Tomcat platforms malicious capabilities. It causes infected machines to maintain Internet…
D-Link router flaw lets anyone login through “Joel’s Backdoor”
Members of the embedded systems hacker collective /dev/ttys0 spend their time playing around with devices like home routers and set-top boxes. They like to see what interesting facts these devices’ proprietary hardware and firmware might reveal. Part of the hackers’ motivation is to get the devices to do things that the…
Security engineer hides hacking device in laptop power supply to create network backdoor
You gotta love security geeks — they can make it so easy for you. At least, if you’re a black hat hacker. Network security engineer “Richee” posted complete details about how to make a tiny Raspberry Pi computer look like a ordinary laptop power brick, and then give himself a physical backdoor into…
Barracuda moves to shutter backdoor access to its network gear
Barracuda Networks released a new update on Monday to further mitigate a security issue that could have allowed attackers to gain unauthorized access to some of its network security appliances through backdoor accounts originally intended for remote support. The company apologized to customers for its design decisions that led to…
ZTE Says it Will Fix Backdoor in ScoreM Handsets (May 18, 2012)
A China-based handset manufacturer has acknowledged that one of its models contains a backdoor……. View full post on SANS NewsBites View full post on National Cyber Security
ZTE Says it Will Fix Backdoor in ScoreM Handsets (May 18, 2012)
A China-based handset manufacturer has acknowledged that one of its models contains a backdoor……. View full post on SANS NewsBites View full post on National Cyber Security
Why Does ZTE’s Score M Have a Built-In Backdoor Hole?
The Chinese handset maker’s entry level Android smartphone can be taken over by anyone with a hard-coded password, and guess what—it’s been published on the Internet. View full post on PCMag.com Security … View full post on National Cyber Security