Researchers may have found a way to trace serial IP hijackers

Hijacking IP addresses is an increasingly popular form of cyberattack. This is done for a range of reasons, from sending spam and malware to stealing Bitcoin. It’s estimated that in 2017 alone, routing incidents such as IP hijacks affected more than 10… Continue reading Researchers may have found a way to trace serial IP hijackers

Vulnerable TP-Link Wi-Fi extenders open to attack, patch now!

Several TP-Link Wi-Fi extender devices sport a critical remote code execution vulnerability that could allow attackers to take over the devices and command them with the same privileges of their legitimate user, IBM X-Force researcher Grzegorz Wypych w… Continue reading Vulnerable TP-Link Wi-Fi extenders open to attack, patch now!

In the Dark About Supply Chain Vulnerabilities

The software supply chain can create a seemingly endless attack surface. Here’s what you can do to better protect it. Is the “Barium” hacking collective Chinese? Russian? North Korean? It really doesn’t matter. What we know for sure is that thei… Continue reading In the Dark About Supply Chain Vulnerabilities

Lax Telco Security Allows Mobile Phone Hijacking and Redirects

A Q&A with Kaspersky Lab researcher David Jacoby examines a gaping hole in the telco customer-service process that allows adversaries to commandeer phone calls. Continue reading Lax Telco Security Allows Mobile Phone Hijacking and Redirects

Consumer routers targeted by DNS hijacking attackers

Owners of a slew of D-Link, ARGtek, DSLink, Secutech, TOTOLINK and Cisco consumer routers are urged to update their device’s firmware, lest they fall prey to ongoing DNS hijacking campaigns and device hijacking attacks. Targeted Cisco routers The… Continue reading Consumer routers targeted by DNS hijacking attackers

Modern browser APIs can be abused for hijacking device resources

Powerful capabilities of modern browser APIs could be misused by attackers to take control of a site visitor’s browser, add it to their botnet, and use it for a variety of malicious actions, researchers from the Foundation for Research and Technology &… Continue reading Modern browser APIs can be abused for hijacking device resources

Researchers eavesdrop on DNA synthesizer to steal genetic blueprint

Researchers from the University of California, Irvine (UCI) and the University of California, Riverside (UCR) have uncovered the possibility of an acoustic side-channel attack on the DNA synthesis process, a vulnerability that could present a serious r… Continue reading Researchers eavesdrop on DNA synthesizer to steal genetic blueprint