Security Boulevard’s 5 Most Read Stories for the Week, August 13-17

A new week, a new crop of security stories. Last week, lack of user privacy, man-in-the-attack, dumb privacy rules and Intel CPUs vulnerabilities made the headlines. In addition, we discussed how to get smarter about securing smart technologies. Be su… Continue reading Security Boulevard’s 5 Most Read Stories for the Week, August 13-17

Man-in-the-Disk Attack Lets Hackers Bypass Android App Sandbox Security

Researchers have devised a new attack technique that takes advantage of how apps use the external storage of Android devices to store files to bypass security restrictions. Under the Android security model each application runs inside a sandbox, which… Continue reading Man-in-the-Disk Attack Lets Hackers Bypass Android App Sandbox Security

Faxploit: Fax-Enabled Machines Easily Hacked Using a Fax Number

A new hack attack endangering all-in-one printer-fax machines was revealed by Check Point researchers during this year’s DEF CON. The hack, smartly dubbed Faxploit, was tested on HP machines but similar attacks could apply to other vendors and fa… Continue reading Faxploit: Fax-Enabled Machines Easily Hacked Using a Fax Number

Report: ‘Faxploit’ hack can penetrate networks with just a fax number

Fax machines, very much still a thing, can be used as an entry point into an enterprise’s IT network, according to new research from Israeli cybersecurity company Check Point. In a report released Monday, Check Point details an exploit whereby an attacker can infiltrate using only a fax number associated with a machine on a target network. Attacks can then move across a network, even if it’s not connected to the internet, according to the report. As demonstrated by Check Point in the video below, the hacker can execute script that targets the victim’s fax number in order to obtain network access. The attacker can then use EternalBlue, a NSA-developed exploit leaked by the Shadow Brokers hacker group, to further infiltrate the network and execute malware. In Check Point’s video, the hacker uses malware to locate a file on the victim network and send it back to the hacker’s fax […]

The post Report: ‘Faxploit’ hack can penetrate networks with just a fax number appeared first on Cyberscoop.

Continue reading Report: ‘Faxploit’ hack can penetrate networks with just a fax number