Hackaday Links: June 2, 2024
So you say you missed the Great Solar Storm of 2024 along with its attendant aurora? We feel you on that; the light pollution here was too much for decent …read more Continue reading Hackaday Links: June 2, 2024
Collaborate Disseminate
So you say you missed the Great Solar Storm of 2024 along with its attendant aurora? We feel you on that; the light pollution here was too much for decent …read more Continue reading Hackaday Links: June 2, 2024
The American Radio Relay League (ARRL) has been targeted in a cyberattack that resulted in disruption and possibly a data breach.
The post American Radio Relay League Hit by Cyberattack appeared first on SecurityWeek.
Continue reading American Radio Relay League Hit by Cyberattack
This is another attack that convinces the AI to ignore road signs:
Due to the way CMOS cameras operate, rapidly changing light from fast flashing diodes can be used to vary the color. For example, the shade of red on a stop sign could look different on each line depending on the time between the diode flash and the line capture.
The result is the camera capturing an image full of lines that don’t quite match each other. The information is cropped and sent to the classifier, usually based on deep neural networks, for interpretation. Because it’s full of lines that don’t match, the classifier doesn’t recognize the image as a traffic sign…
This attack has been feasible for over two decades:
Researchers have devised an attack against nearly all virtual private network applications that forces them to send and receive some or all traffic outside of the encrypted tunnel designed to protect it from snooping or tampering.
TunnelVision, as the researchers have named their attack, largely negates the entire purpose and selling point of VPNs, which is to encapsulate incoming and outgoing Internet traffic in an encrypted tunnel and to cloak the user’s IP address. The researchers believe it affects all VPN applications when they’re connected to a hostile network and that there are no ways to prevent such attacks except when the user’s VPN runs on Linux or Android. They also said their attack technique may have been possible since 2002 and may already have been discovered and used in the wild since then…
Telecom giant Frontier shuts down systems to contain a cyberattack that led to personal information compromise.
The post Frontier Communications Shuts Down Systems Following Cyberattack appeared first on SecurityWeek.
Continue reading Frontier Communications Shuts Down Systems Following Cyberattack
As many people suspected, Omni Hotels & Resorts was the target of a ransomware attack in March. Omni first described the incident as a chain-wide “outage” due to IT issues. By April 1, guests were losing patience with the “outage…. Continue reading Omni Hotels & Resorts attack claimed by Daixin Team; 3.5 million guests’ data stolen (2)
Japanese lens maker Hoya says production processes and ordering systems were disrupted by a cyberattack.
The post Lens Maker Hoya Scrambling to Restore Systems Following Cyberattack appeared first on SecurityWeek.
Continue reading Lens Maker Hoya Scrambling to Restore Systems Following Cyberattack
Texas-based Omni Hotels & Resorts has been responding to a cyberattack that started last Friday, which resulted in the unavailability of many of its IT systems. According to people staying at some of the 50 properties the company operates across N… Continue reading Omni Hotels suffer prolonged IT outage due to cyberattack
Omni Hotels & Resorts tells customers that recent disruptions have been caused by a cyberattack that forced it to shut down systems.
The post Cyberattack Causes Disruptions at Omni Hotels appeared first on SecurityWeek.
Continue reading Cyberattack Causes Disruptions at Omni Hotels
You might think that libraries are kind of boring, but this self-analysis of a 2023 ransomware and extortion attack against the British Library is anything but.
Continue reading Lessons from a Ransomware Attack against the British Library