1 million DVRs are ready to become a new botnet

Experts found a vulnerability in the software from the Chinese manufacturer XiongMai. About 1 million digital video recorders contain an uncorrected vulnerability that could lead to the emergence of a new powerful botnet like the infamous Mirai. According to experts from the British company Pen Test Partners, the vulnerability is present in the network software…

Details

Almost 1 million systems provide guest access via SMB protocol

Of the 2,306,820 devices with open ports for SMB access, 96% support SMBv1. Currently, the network has discovered 2,306,820 devices with open ports for SMB access. This protocal infected hundreds of thousands of computers with WannaCry’s extortion software last month. Of the above number of devices, 42% (about 970 thousand) provide guest access or anyone who…

Details

Hard drive LED lights manipulated to transmit data to remote viewers

As if in a plot of a cyber-thriller TV show, the blinking lights of hard drive LEDS can now be exploited to steal data off of the host computer.  Israeli security researchers have successfully created and tested this type of attack in a controlled environment.  One of the major upsides to this type of malware…

Details

Updated Webroot virus definitions mistakenly target core Windows files

In an ironic twist, Webroot security tools have caused users to become less safe this morning.  A major bug has caused the security tool suite to start labeling core windows system files as generic Trojan files.  The Antivirus then placed these files in the quarantine chest, thus rendering the operating system unusable.  Thankfully the bug…

Details

iMovie, GarageBand, iWork is now free for all Mac and iOS users

As a gesture of good faith, Apple has released most of their core software for free to any users on their operating system.  These programs, iMovie, Numbers, Keynote, Pages, and Garage band are available at the App Store for free for all users. These programs were free to users who have purchased a brand new…

Details

Malicious Bots floating around on the internet brick IOT devices

  The internet is becoming like the ocean, a wonderfully fascinating place full of wonder and places to explore and discover, but it’s unsettling in the sense that it has so many things that can kill you hidden in its depths.   That’s if you’re an IOT device.  Researchers have set up a honeypot (an internet…

Details

Pwn2own 2016 hacking competition reveals many security exploits

Chaitin Tech, a Chinese enterprise security firm held a hacking event in which competitors would hack popular programs and operating systems for cash prizes.  This event was held a year ago and featured over a million dollars in cash prizes.  The goal was simple, in order to “pwn” a program, competitors had to execute arbitrary…

Details