TikTok Flaw Allows Threat Actors to Plant Forged Videos in User Feeds

The popular video-sharing apps’s use of HTTP to download media content instead of a secure protocol could lead to the spread of misinformation on the platform. Continue reading TikTok Flaw Allows Threat Actors to Plant Forged Videos in User Feeds

Parents, it’s time to delete Pet Chat from your child’s LeapPad

LeapFrog has done lots to fix the security of the LeapPad. Now all that’s left is for parents to scrape Pet Chat off of older tablets. Continue reading Parents, it’s time to delete Pet Chat from your child’s LeapPad

AWDL flaws open Apple users to tracking, MitM, malware planting

Vulnerabilities in Apple Wireless Direct Link (AWDL), the wireless protocol that underpins Apple’s AirPlay and AirDrop services, could allow attackers to track users in spite of MAC randomization, to intercept and modify transmitted files, and to… Continue reading AWDL flaws open Apple users to tracking, MitM, malware planting

Bluetooth Attacks | Don’t Let Your Endpoints Down

What threats does Bluetooth wireless technology present to the enterprise and what can you do to prevent them? We investigate the problems and solutions.
The post Bluetooth Attacks | Don’t Let Your Endpoints Down appeared first on Security Boulevard.
Continue reading Bluetooth Attacks | Don’t Let Your Endpoints Down

Google recalls Titan Bluetooth keys after finding security flaw

Google had egg on its face this week after it had to recall some of its Titan hardware security keys for being insecure. Continue reading Google recalls Titan Bluetooth keys after finding security flaw

Mobile Risks Boom in a Post-Perimeter World

The bloom is on mobile, whether it be the enterprise, employees or the cybercriminals plotting new ways to slip past a corporate defenses in a post-parameter world. Continue reading Mobile Risks Boom in a Post-Perimeter World

Bad Actors Using MitM Attacks against ASUS to Distribute Plead Backdoor

Researchers believe bad actors are using man-in-the-middle (MitM) attacks against ASUS software to distribute the Plead backdoor. Near the end of April 2019, researchers at ESET observed several attack attempts that both created and executed the Plead … Continue reading Bad Actors Using MitM Attacks against ASUS to Distribute Plead Backdoor