Firmware Backdoors Discovered in Surveillance Cameras

Firmware Backdoors Discovered in Surveillance Cameras

Replacing the systems with secure cameras recommended

  • Apple
  • By Bogdan Popa
  • January 14th, 2020
Microsoft Sides with Apple in Anti-Backdoor Fight

Microsoft Sides with Apple in Anti-Backdoor Fight

CEO Satya Nadella says “backdoors are a terrible idea”

Huawei Founder Denies Spying Allegations, Says No Backdoor Request Ever Made

Huawei Founder Denies Spying Allegations, Says No Backdoor Request Ever Made

Ren Zhengfei comments on all the spying claims

Crooks Use Spoofed Critical Russian Infrastructure Domains to Mimic State APT

Crooks Use Spoofed Critical Russian Infrastructure Domains to Mimic State APT

RedControle backdoor chosen as the group's weapon of choice

'Open-Source' DarthMiner Malware Targets Adobe Pirates with Cryptominer

'Open-Source' DarthMiner Malware Targets Adobe Pirates with Cryptominer

Also contains a disabled encrypted traffic sniffer module

GreyEnergy APT Delivers Malware via Phishing Attacks and Multi-Stage Dropper

GreyEnergy APT Delivers Malware via Phishing Attacks and Multi-Stage Dropper

The modular backdoor can be upgraded remotely by attackers

Fileless Backdoored Trojan Spreads Using Worm Living in Removable Drives

Fileless Backdoored Trojan Spreads Using Worm Living in Removable Drives

The Trojan comes with key logging and DDoSing capabilities

Lazarus APT Uses Modular Backdoor to Target Financial Institutions

Lazarus APT Uses Modular Backdoor to Target Financial Institutions

WannaCry makers also recently used Fastcash to empty ATMs

Inception Group Uses POWERSHOWER Backdoor in Two-Stage Spear Phishing Attacks

Inception Group Uses POWERSHOWER Backdoor in Two-Stage Spear Phishing Attacks

Backdoor uses anti-forensics techniques to hinder analysis

Almost 12K MikroTik Routers Are Hunting Around for Cryptojacking Opportunities

Almost 12K MikroTik Routers Are Hunting Around for Cryptojacking Opportunities

Infected routers get backdoored and set up as cryptojackers

  • Security
  • By Sergiu Gatlan
  • September 18th, 2018
Paste Site Used as Hosting Service for FilesMan Backdoor

Paste Site Used as Hosting Service for FilesMan Backdoor

The malicious code allows attackers to reinfect websites

  • Security
  • By Sergiu Gatlan
  • September 17th, 2018
Critical Peekaboo Vulnerability Gives Attackers Access to CCTV Cameras

Critical Peekaboo Vulnerability Gives Attackers Access to CCTV Cameras

NUUO's Video Recorder Software can be exploited remotely using a stack buffer overflow and a debug code backdoor

Telegram Says They’ll Help Everyone Catch Terrorists, Except for Russia

Telegram Says They’ll Help Everyone Catch Terrorists, Except for Russia

Russia banned Telegram earlier this year

FBI Admits It Inflated the Number of iPhones It Can’t Hack

FBI Admits It Inflated the Number of iPhones It Can’t Hack

The Bureau says there are fewer protected iPhones

  • Apple
  • By Bogdan Popa
  • March 27th, 2018
Apple Again Rejects Idea of iPhone Backdoor

Apple Again Rejects Idea of iPhone Backdoor

FBI and US government seeking access to all devices

FBI Says It Wants To (But Can’t) Hack 8,000 Devices

FBI Says It Wants To (But Can’t) Hack 8,000 Devices

And that’s why a backdoor is needed, Director Wray says

BlackBerry Ready to Hack Its Users If the Government Wants It To

BlackBerry Ready to Hack Its Users If the Government Wants It To

Company CEO says they’d try to break encryption if needed

 
Want more? Browse: