Hackers gathered in Tokyo during the first week of November 2019; they were there to hack stuff and make money. They succeeded, and then some. The "stuff" successfully hacked during the Pwn2Own Tokyo event included an Amazon Echo Show 5, a brace of smart TVs, some routers and the Xiaomi M9 smartphone. Oh yes, and the Samsung Galaxy S10. Twice.
Pwn2Own is a hacking event that started in 2007 and is now held twice every year. The hacking teams taking part are comprised of some of the leading security researchers, or "white hat" hackers, from around the world. They aim to "pwn" specific devices, in competition against each other. Pwning is defined as "utterly defeating" someone in a video game or, in this case, a something.
And here's another article:
He Thought His Phone Was Secure; Then He Lost $24 Million to Hackers - WSJ
But Mr. Terpin wasn't driving between cell towers. He was working at a desk in his Las Vegas home. Way off in Norwich, Conn., someone had just taken over his phone number.
This past May, Google released research showing that by adding a phone number, users could block most types of attacks on their accounts.
“ Google said even when its users added a phone number as a security layer, about a third of targeted attacks managed to succeed. ”
Hackers Can Use Lasers to 'Speak' to Your Amazon Echo or Google Home | WIRED
In the spring of last year, cybersecurity researcher Takeshi Sugawara walked into the lab of Kevin Fu, a professor he was visiting at the University of Michigan. He wanted to show off a strange trick he'd discovered. Sugawara pointed a high-powered laser at the microphone of his iPad—all inside of a black metal box, to avoid burning or blinding anyone—and had Fu put on a pair of earbuds to listen to the sound the iPad's mic picked up.
"It's possible to make microphones respond to light as if it were sound," says Sugawara. "This means that anything that acts on sound commands will act on light commands."
Russia Steps Up Efforts to Shield Its Hackers From Extradition to U.S. - WSJ
Naama Issachar trod a path familiar to many Israelis after completing her army service—she spent a few months traveling around India and planned to return to Tel Aviv in April, flying through Moscow because the airfare was cheaper.
That's when Russian authorities found a small amount of marijuana—9 grams, or slightly less than one-third of an ounce—in her suitcase. Ms. Issachar, a 26-year-old Israeli-American, never boarded the plane back to Israel and has been detained in Russia ever since.
This may worth something:
Two security researchers earned $60,000 for hacking an Amazon Echo – TechCrunch
Two security researchers have been crowned the top hackers in this year’s Pwn2Own hacking contest after developing and testing several high profile exploits, including an attack against an Amazon Echo.
Amat Cama and Richard Zhu, who make up Team Fluoroacetate, scored $60,000 in bug bounties for their integer overflow exploit against the latest Amazon Echo Show 5, an Alexa-powered smart display.
The researchers tested their exploits in a radio-frequency shielding enclosure to prevent any outside interference.
The Story of Sandworm, the Kremlin's Most Dangerous Hackers | WIRED
Over the last half decade, the world has witnessed a disturbing escalation in disruptive cyberattacks. In 2015 and 2016, hackers snuffed out the lights for hundreds of thousands of civilians in the first power outages ever triggered by digital sabotage. Then came the most expensive cyberattack in history, NotPetya, which inflicted more than $10 billion in global damage in 2017.
Hackers demand bitcoin ransom from Johannesburg city after cyber attack - CNN
(CNN) Authorities in Johannesburg are scrambling to gain control of the city's cyber networks from hackers who are demanding payment in bitcoins.
Hacking the hackers: Russian group hijacked Iranian spying operation, officials
The Russian group, known as “Turla” and accused by Estonian and Czech authorities of operating on behalf of Russia’s FSB security service, has used Iranian tools and computer infrastructure to successfully hack in to organizations in at least 20 different countries over the last 18 months, British security officials said.
The hacking campaign, the extent of which has not been previously revealed, was most active in the Middle East but also targeted organizations in Britain, they said.
Happening on Twitter
Samsung Galaxy S10 users can now access Tron tokens and applications on their phones, Justin Sun revealed on Twitte… https://t.co/BlwwGkGSqF ForbesCrypto (from Distributed) Sun Nov 03 18:11:01 +0000 2019
Success! The @fluoroacetate duo got the #Samsung Galaxy S10 to connect to their rogue base station and then pushed… https://t.co/hJKhx3F9Mu thezdi (from Austin, Texas) Thu Nov 07 02:09:05 +0000 2019
Confirmed! The @fluoroacetate duo used a bug in JavaScript JIT followed by a UAF to escape the sandbox to grab a pi… https://t.co/Oey2pnHKDZ thezdi (from Austin, Texas) Wed Nov 06 08:53:00 +0000 2019
Phones with great battery life 👇 📱Samsung Galaxy Note 10 Plus 📱Huawei P30 Pro 📱Motorola Moto G7 Power 📱Samsung Gala… https://t.co/Rv9qNu500x CNET (from San Francisco) Thu Nov 07 13:39:34 +0000 2019
No comments:
Post a Comment