Attacker combines phone, email lures into believable, complex attack chain
Credit to Author: Andrew Brandt| Date: Thu, 10 Aug 2023 10:00:10 +0000
A social engineering phone call lends authenticity to the attacker’s malicious email
Read moreCredit to Author: Andrew Brandt| Date: Thu, 10 Aug 2023 10:00:10 +0000
A social engineering phone call lends authenticity to the attacker’s malicious email
Read moreCredit to Author: BrianKrebs| Date: Fri, 14 Apr 2023 20:27:56 +0000
KrebsOnSecurity received a nice bump in traffic this week thanks to tweets from the Federal Bureau of Investigation (FBI) and the Federal Communications Commission (FCC) about “juice jacking,” a term first coined here in 2011 to describe a potential threat of data theft when one plugs their mobile device into a public charging kiosk. It remains unclear what may have prompted the alerts, but the good news is that there are some fairly basic things you can do to avoid having to worry about juice jacking.
Read moreCredit to Author: BrianKrebs| Date: Fri, 12 Aug 2022 15:26:58 +0000
The Department of Homeland Security (DHS) is urging states and localities to beef up security around proprietary devices that connect to the Emergency Alert System — a national public warning system used to deliver important emergency information, such as severe weather and AMBER alerts. The DHS warning came in advance of a workshop to be held this weekend at the DEFCON security conference in Las Vegas, where a security researcher is slated to demonstrate multiple weaknesses in the nationwide alert system.
Read moreCredit to Author: Lisa Vaas| Date: Tue, 01 Oct 2019 11:31:59 +0000
That’s how Senator Wyden described the results of DefCon’s Voting Village, where all of 100 voting systems were easily picked apart by hackers.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/buAZK9dzyQA” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Lisa Vaas| Date: Thu, 19 Sep 2019 14:42:48 +0000
This year, the Air Force presented vetted hackers with a plane’s subsystem, which they duly tore up. Next year, it will be a satellite.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/wh-pZprliQk” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Lisa Vaas| Date: Thu, 15 Aug 2019 10:58:55 +0000
The vanity plate sounded good in theory: maybe it would make his plate invisible to ALPR systems?!<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/0V6dSt5YHpQ” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Lisa Vaas| Date: Tue, 13 Aug 2019 13:54:10 +0000
Security researcher Matt Wixey found that many gadgets aren’t protected from being turned into hearing-damaging weapons. Or melting.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/S9CML6xBVTQ” height=”1″ width=”1″ alt=””/>
Read more