Source: National Cyber Security – Produced By Gregory Evans The IoT – or Internet of Things – is more or less the way of the future for personal technology. Be it refrigerators synced to a grocery list app on your phone, cars which can drive themselves, or whatever new The…
Patched ‘KNOXout’ Samsung Exploit Offered Control To Hackers
Source: National Cyber Security – Produced By Gregory Evans Traditionally, one of the bigger benefits of buying a Samsung device was security. This was mostly thanks to the Knox software, a special multi-faceted security suite that included a number of tools to keep Samsung owners from having to feel The…
Google Hacker Finds Way To Exploit Yet Another ‘Stagefright’ Bug
Source: National Cyber Security – Produced By Gregory Evans More than a year after the original discovery of the infamous Android bugs known as Stagefright, hackers keep finding similar flaws. On Wednesday, Google’s own elite team of hackers released a proof-of-concept hacking technique that some believe could be used The…
The Jeep Hackers Reveal New Exploit: They Can Take Over The Vehicle While Running At High Speeds
Source: National Cyber Security – Produced By Gregory Evans Remember the Jeep hackers? Continuing on their work from last year, Charlie Miller and Chris Valasek have found a new exploit for the SUV, allowing them to take over the vehicle even while it is moving at high speeds. Last year,…
Hackers exploit WiFi vulnerability to neutralise Mitsubishi Outlander alarm
Source: National Cyber Security – Produced By Gregory Evans Hackers have exposed a vulnerability in the Mitsubishi Outlander plug-in hybrid electric vehicle that could allow the car’s anti-theft alarms to be disabled. The flaw was discovered by security researchers Pen Test Partners, which investigates potential vulnerabilities in connected devices using…
Using zero-day exploit revealed by professional hackers, FBI reportedly hacked San Bernardino iPhone
After several weeks of demands, and on the eve of the trial, the FBI said it no longer required Apple’s help to crack the San Bernardino iPhone last month after the government firm was aided by a “third-party.” According to the Isreali media, this unnamed entity was Cellebrite, a mobile…
New Russian Hacker Exploit ‘Most Significant Cyber-Espionage Threat’ To US, NATO Partners
Source: National Cyber Security – Produced By Gregory Evans The Russian hacker group Pawn Storm is using a vulnerability in Adobe Flash Player to install malware on computers belonging to several “foreign ministries,” Trend Micro researchers reported Tuesday. Pawn Storm “is the most significant cyber-espionage threat to the U.S. government and her NATO…
Microsoft to eliminate an exploit that allows Android to run on Windows 10 Mobile
If Microsoft wasn’t so adamant about preventing one Android based bug from being exploited by Windows 10 Mobile users, those provided the right tools from Microsoft would be able to run Android on their Windows 10 Mobile powered handsets. Think about all of those Android flavored apps not available for…
Hackers exploit ‘Security flaw’ in iOS App to hack WeChat
WeChat hacked through ‘security flaw’ in iOS App, no user data or money stolen The popular messaging app, WeChat, which has over 600 million users was hacked through a security flaw said Tencent on Friday. However, it has been patched since then. After a preliminary investigation, the company said that no…
‘Stagefright’ exploit allows hackers to take over Android phones
Source: National Cyber Security – Produced By Gregory Evans Relatively new, the ‘Stagefright’ exploit allows a hacker to take over a vulnerable Android phone just by sending you an MMS message with a video embedded – if you play the video – the hacker can access your phone. Back in…