US Warns That Iran Terrorists Broke into Multiple US Water Facilities Last week I reported that the Aliquippa, Pennsylvania Water Authority fessed up to the fact that hackers successfully broke into their network, compromising a pump station, using a vulnerability in an Israeli OT network system that is repackaged by multiple vendors. Now the FBI, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
There have been many issues over the years with passive (keyless) entry systems, including but not limited to vehicles. In this case, researchers at the NCC Group used a “relay attack” to not only unlock a Tesla Model 3, but also start it and drive away. A relay attack works like this. You take one […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Researchers from the Singapore University of Technology and Design have published details about BrakTooth, a new family of security vulnerabilities in Bluetooth software implementations. They assessed 13 Bluetooth devices from about a dozen vendors including Intel, Qualcomm, Texas Instruments and Cypress and found 16 vulnerabilities. On the good side, they can cause a denial of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The UK Might Beat Us to Regulating MSPs In the US, anyone can become a managed service provider. Unfortunately, customers may think that comes with security, but usually it does not. The UK is about to create a legally binding cybersecurity framework for managed service providers. This may be the first step at forcing businesses […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Israeli Researchers have disclosed two new Bluetooth attacks that only require you to be in the neighborhood to work. The attacks exploit flaws in Bluetooth Low Energy (BLE) chips made by Texas Instruments. The chips are used by companies like Cisco, Meraki and Aruba in their corporate solutions. The chips are also used in pacemakers […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Similar to the WiFi bug we reported about in July (see post), this Bluetooth bug does not require the user to interact with the hacker, does not require the user to connect to an infected Bluetooth device or anything like that. All it requires is that Bluetooth is turned on in the device. The good […]
Continue reading →
[DISPLAY_ACURAX_ICONS]