Researchers Find Most ATMs Vulnerable to Hacker Attacks

A new study that analyzed ATMs from three major manufacturers found that two-thirds of them were vulnerable to physical black box attacks and an even larger number were vulnerable to network attacks. The research project spanned two years and was carr… Continue reading Researchers Find Most ATMs Vulnerable to Hacker Attacks

1-800-772-1213 Social Security Administration Scam – Beware

A new warning was just issued by the Federal Trade Commission regarding a scam that involves the Social Security Administration. Apparently, scammers are spoofing the administration’s customer service number – 1-800-772-1213. So, if you are… Continue reading 1-800-772-1213 Social Security Administration Scam – Beware

The Masquerade Ball: Train Yourself to Detect Spoofed Files

Masquerading is a technique used in which a file name is maliciously named something similar to one which may be trusted. This specific technique is outlined in detail in the MITRE ATT&CK framework, as well. For example, a file named explorer.exe m… Continue reading The Masquerade Ball: Train Yourself to Detect Spoofed Files

Security Vulnerability in Internet-Connected Construction Cranes

This seems bad: The F25 software was found to contain a capture replay vulnerability — basically an attacker would be able to eavesdrop on radio transmissions between the crane and the controller, and then send their own spoofed commands over the air to seize control of the crane. "These devices use fixed codes that are reproducible by sniffing and re-transmission,"… Continue reading Security Vulnerability in Internet-Connected Construction Cranes

New Sextortionist Scam Uses Email Spoofing Attack to Trick Users

A new sextortionist scam is using spoofing techniques to trick users into thinking that digital attackers have compromised their email accounts. As reported by Bleeping Computer, an attack email belonging to this ploy attempts to lure in a user with th… Continue reading New Sextortionist Scam Uses Email Spoofing Attack to Trick Users