Lenovo shipping laptops with pre-installed adware that kills HTTPS

Thursday, February 19th, 2015

Lenovo is in hot water after it was revealed on Wednesday that the company is shipping consumer laptops with Superfish (Adware) pre-installed. Security experts are alarmed, as the software performs Man-in-the-Middle attacks that compromises all SSL connections. It's a fact of life; PC manufacturers are paid to install software at the ...

NSA planted surveillance software on hard drives, report says

Tuesday, February 17th, 2015

The National Security Agency is able to infect hard drives with surveillance software to spy on computers, Reuters said on Tuesday, citing information from cyber researchers and former NSA operatives. In a new report, Kaspersky revealed the existence of a group dubbed The Equation Group capable of directly accessing the firmware ...

D-Link routers vulnerable to DNS hijacking

Thursday, January 29th, 2015

At least one and likely more D-Link routers as well as those of other manufacturers using the same firmware are vulnerable to remote changing of DNS settings and, effectively, traffic hijacking, a Bulgarian security researcher has discovered. Todor Donev, a member of the Ethical Hacker research team, says that ...

Two Million Cars Using Wireless Insurance Dongle Vulnerable to Hacking

Wednesday, January 21st, 2015

2015 will be a year more smarter than 2014 with smarter mobile devices, smarter home appliances, and yes Smarter Automobiles. Nowadays, there are a number of automobiles companies offering vehicles that run on a mostly drive-by-wire system, meaning that a majority of the controls are electronically controlled, from instrument cluster ...

Keysweeper: creepy keystroke logger camouflaged as USB charger

Tuesday, January 13th, 2015

KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back all keystrokes from any Microsoft wireless keyboards (which use a proprietary 2.4GHz RF protocol) in the area. Keystrokes are sent back to the KeySweeper operator over the Internet ...