Trend Micro has identified a new piece of malware (see article) that attempts to connect to your home router using default userids and passwords for a number of home router vendors. It tries userids like admin, guest, root and user and passwords like admin, password and 12345678. The malware, named VICEPASS, scans for devices and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Probably many of you saw the 60 Minutes segment on hacking your car (see video here). In the 60 Minutes segment, the researcher/hacker was able to turn on the wipers and washers, blow the horn and disable the brakes in that demonstration. Here is a link to a conversation with the guys who did the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Security researchers at the International Conference On Cyber Security And Cyber Law reported that they have found a fatal security hole in a wide variety of SOHO Internet Routers. As is often the case, the researchers discovered this problem accidentally while examining the code of a router for a completely different problem (see the researcher’s […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Register is reporting that there are a couple of ways a hacker can take over a PC just by having you insert a Blu-Ray disc. The first method exploits a poor software design in PowerDVD, the free DVD player software that is loaded on many PCs. It allows the hacker to exploit a bug […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Mandarin Oriental Hotel Group admitted that their credit card system at an unknown number of their hotels was hacked and credit cards compromised AFTER they were outed by Krebs On Security. The upscale hotel chain, where rooms at the New York property start at $850 a night, would be a great target for hackers […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As I suspected when Apple Pay was released, the hackers did not just give up and say “this is too hard” and all get jobs at Burger King. No, instead they said, what vulnerabilities does Apple Pay have? The first one (at least that we know of) is something called yellow path. The hackers have […]
Continue reading →
[DISPLAY_ACURAX_ICONS]