Sunday, November 10, 2019

Samsung Galaxy S10 Hacked. Twice.

Hackers gathered in Tokyo during the first week of November 2019; they were there to hack stuff and make money. They succeeded, and then some. The "stuff" successfully hacked during the Pwn2Own Tokyo event included an Amazon Echo Show 5, a brace of smart TVs, some routers and the Xiaomi M9 smartphone. Oh yes, and the Samsung Galaxy S10. Twice.

Pwn2Own is a hacking event that started in 2007 and is now held twice every year. The hacking teams taking part are comprised of some of the leading security researchers, or "white hat" hackers, from around the world. They aim to "pwn" specific devices, in competition against each other. Pwning is defined as "utterly defeating" someone in a video game or, in this case, a something.

Publisher: Forbes
Date: 2019-11-10
Author: Davey Winder
Twitter: @forbes
Reference: (Read more) Visit Source



And here's another article:

He Thought His Phone Was Secure; Then He Lost $24 Million to Hackers - WSJ

But Mr. Terpin wasn't driving between cell towers. He was working at a desk in his Las Vegas home. Way off in Norwich, Conn., someone had just taken over his phone number.

This past May, Google released research showing that by adding a phone number, users could block most types of attacks on their accounts.

“ Google said even when its users added a phone number as a security layer, about a third of targeted attacks managed to succeed. ”

logo
Publisher: WSJ
Date: 2019-11-08T14:00:00.000Z
Author: Robert McMillan
Twitter: @WSJ
Reference: (Read more) Visit Source



Hackers Can Use Lasers to 'Speak' to Your Amazon Echo or Google Home | WIRED

In the spring of last year, cybersecurity researcher Takeshi Sugawara walked into the lab of Kevin Fu, a professor he was visiting at the University of Michigan. He wanted to show off a strange trick he'd discovered. Sugawara pointed a high-powered laser at the microphone of his iPad—all inside of a black metal box, to avoid burning or blinding anyone—and had Fu put on a pair of earbuds to listen to the sound the iPad's mic picked up.

"It's possible to make microphones respond to light as if it were sound," says Sugawara. "This means that anything that acts on sound commands will act on light commands."

Publisher: Wired
Author: Condé Nast
Twitter: @wired
Reference: (Read more) Visit Source



Russia Steps Up Efforts to Shield Its Hackers From Extradition to U.S. - WSJ

Naama Issachar trod a path familiar to many Israelis after completing her army service—she spent a few months traveling around India and planned to return to Tel Aviv in April, flying through Moscow because the airfare was cheaper.

That's when Russian authorities found a small amount of marijuana—9 grams, or slightly less than one-third of an ounce—in her suitcase. Ms. Issachar, a 26-year-old Israeli-American, never boarded the plane back to Israel and has been detained in Russia ever since.

logo
Publisher: WSJ
Date: 2019-11-06T00:08:00.000Z
Author: Dustin Volz in Washington and Felicia Schwartz in Tel Aviv
Twitter: @WSJ
Reference: (Read more) Visit Source



This may worth something:

Two security researchers earned $60,000 for hacking an Amazon Echo – TechCrunch

Two security researchers have been crowned the top hackers in this year’s Pwn2Own hacking contest after developing and testing several high profile exploits, including an attack against an Amazon Echo.

Amat Cama and Richard Zhu, who make up Team Fluoroacetate, scored $60,000 in bug bounties for their integer overflow exploit against the latest Amazon Echo Show 5, an Alexa-powered smart display.

The researchers tested their exploits in a radio-frequency shielding enclosure to prevent any outside interference.

Publisher: TechCrunch
Date: 2019-11-09 09:24:21
Twitter: @techcrunch
Reference: (Read more) Visit Source



The Story of Sandworm, the Kremlin's Most Dangerous Hackers | WIRED

Over the last half decade, the world has witnessed a disturbing escalation in disruptive cyberattacks. In 2015 and 2016, hackers snuffed out the lights for hundreds of thousands of civilians in the first power outages ever triggered by digital sabotage. Then came the most expensive cyberattack in history, NotPetya, which inflicted more than $10 billion in global damage in 2017.

Publisher: Wired
Author: Condé Nast
Twitter: @wired
Reference: (Read more) Visit Source



Hackers demand bitcoin ransom from Johannesburg city after cyber attack - CNN

(CNN) Authorities in Johannesburg are scrambling to gain control of the city's cyber networks from hackers who are demanding payment in bitcoins.

Publisher: CNN
Date: 2019-10-29T15:49:54Z
Author: Bukola Adebayo CNN
Reference: (Read more) Visit Source



Hacking the hackers: Russian group hijacked Iranian spying operation, officials

The Russian group, known as “Turla” and accused by Estonian and Czech authorities of operating on behalf of Russia’s FSB security service, has used Iranian tools and computer infrastructure to successfully hack in to organizations in at least 20 different countries over the last 18 months, British security officials said.

The hacking campaign, the extent of which has not been previously revealed, was most active in the Middle East but also targeted organizations in Britain, they said.

Publisher: U.S.
Date: 2019-10-21T20:24:01+0000
Author: Jack Stubbs
Twitter: @Reuters
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment

Featured Post

Galaxy S24+. $919.99 Limited Deals

Galaxy S24+ — $919.99 Get th...

Popular Posts