In the opaque world of government hacking, private firms grapple with allegiances

Private sector cybersecurity companies are increasingly stuck with difficult decisions when it comes to publicizing research into malware. Over the past few years, nation-states have increasingly devoted time, money and man-hours to creating sophisticated weapons that wreak havoc once they are unleashed on the internet. When private companies find these nation-state tools and break them apart for examination, the dynamic gets complicated very quickly: No longer are they just trying to figure out who is responsible — they have to tiptoe around the ramifications of how a public report could impact relationships with governments around the world. Beyond merely attributing sophisticated malware, large-scale cybersecurity firms are often left with tough questions: Should those based in the United States avoid publicly releasing research on cyber-espionage campaigns if they look to be conducted by allied governments? What does a company owe its clients when handling homegrown digital threats? Do these companies have a plan of action for […]

The post In the opaque world of government hacking, private firms grapple with allegiances appeared first on Cyberscoop.

Continue reading In the opaque world of government hacking, private firms grapple with allegiances

Hackers could hijack internet-connected speakers to remotely play whatever they want

Hackers are able to hijack several popular models of internet-connected speakers, including some devices sold by audio technology giants Bose and Sonos, to remotely control the music you hear in your home, according to research by Japanese cybersecurity company TrendMicro. The findings provide broad insight into the state of security behind some internet-connected audio devices. According to researchers, at least two popular speaker models — the Sonos Play:1 and Bose SoundTouch — could be detected online with a simple internet scanning tool; allowing for a hacker to locate where a device is geographically located, what network it’s connected to and which music platform it relies on. Hackers can discover the speakers — which in this scenario is necessary to find prior to any intrusion — if a user’s network settings are misconfigured or a device is tied to a home server that may be inadvertently connected to the public internet. […]

The post Hackers could hijack internet-connected speakers to remotely play whatever they want appeared first on Cyberscoop.

Continue reading Hackers could hijack internet-connected speakers to remotely play whatever they want

Hackers could hijack internet-connected speakers to remotely play whatever they want

Hackers are able to hijack several popular models of internet-connected speakers, including some devices sold by audio technology giants Bose and Sonos, to remotely control the music you hear in your home, according to research by Japanese cybersecurity company TrendMicro. The findings provide broad insight into the state of security behind some internet-connected audio devices. According to researchers, at least two popular speaker models — the Sonos Play:1 and Bose SoundTouch — could be detected online with a simple internet scanning tool; allowing for a hacker to locate where a device is geographically located, what network it’s connected to and which music platform it relies on. Hackers can discover the speakers — which in this scenario is necessary to find prior to any intrusion — if a user’s network settings are misconfigured or a device is tied to a home server that may be inadvertently connected to the public internet. […]

The post Hackers could hijack internet-connected speakers to remotely play whatever they want appeared first on Cyberscoop.

Continue reading Hackers could hijack internet-connected speakers to remotely play whatever they want