A Bluetooth Low Energy (BLE) vulnerability discovered by NCC Group researchers may be used by attackers to unlock Teslas (or other cars with automotive keyless entry), residential smart locks, building access systems, mobile phones, laptops, and many other devices. About the BLE vulnerability Bluetooth Low Energy (BLE) is a data sharing protocol developed by the Bluetooth Special Interest Group (Bluetooth SIG) and is widely used for proximity authentication in critical applications. The discovered vulnerability is … More
The post BLE vulnerability may be exploited to unlock cars, smart locks, building doors, smartphones appeared first on Help Net Security.
Offensive Security has released Kali Linux 2022.2, the latest version of its popular penetration testing and digital forensics platform. Cosmetic changes Kali Linux 2022.2 comes with: A new version of the GNOME desktop environment, for “a more polished experience” A design and usability improvement for the KDE Plasma graphical workspaces environment Several tweaks for the Xfce (lightweight) desktop environment Some new app icons Color tweaks in the Terminal, to improve legibility and element differentiation A … More
The post Kali Linux 2022.2 released: Desktop enhancements, tweaks for the terminal, new tools, and more! appeared first on Help Net Security.
The US Attorney’s Office is charging a Venezuelan cardiologist with attempted computer intrusions and conspiracy to commit computer intrusions. The charges stem from his use and sale of ransomware, as well as his extensive support of, and profit sharing arrangements with, the cybercriminals who used his ransomware programs. “As alleged, the multi-tasking doctor treated patients, created and named his cyber tool after death, profited from a global ransomware ecosystem in which he sold the tools … More
The post Cardiologist charged for use and sale of ransomware appeared first on Help Net Security.
There was a time, not long ago, when there were only so many ways of accomplishing an information technology task. Whether you were building a website, setting up a new computer, or installing a piece of software, your options were limited — if there were any options at all. That time is over. Now, any kind of product or service can be acquired easily and with minimal effort, and usually for a very low or … More
HP announced that the HP Wolf Security threat research team has identified a 27-fold increase in detections resulting from Emotet malicious spam campaigns in Q1 2022, compared to Q4 2021 – when Emotet first made its reappearance. The latest global HP Wolf Security Threat Insights Report – which provides analysis of real-world cybersecurity attacks – shows that Emotet has bolted up 36 places to become the most common malware family detected this quarter (representing 9% … More
Infoblox unveils a global report examining the state of security concerns, costs, and remedies. As the pandemic and uneven shutdowns stretch into a third year, organizations are accelerating digital transformation projects to support remote work. Meanwhile, attackers have seized on vulnerabilities in these environments, creating more work and larger budgets for security teams. 1,100 respondents in IT and cybersecurity roles in 11 countries – United States, Mexico, Brazil, United Kingdom, Germany, France, the Netherlands, Spain, … More
The post Remote work hazards: Attackers exploit weak WiFi, endpoints, and the cloud appeared first on Help Net Security.