Recently, at the Tokyo PacSec conference, Chinese researched has discovered and successfully exploited Google’s Project Fi Nexus 6 device running the latest version of Android (6.0 Marshmallow). As a result, he was able to install fake app into the phone that could theoretically be used to take the device control away from the user. In a demo example, he installed a simple BMX bike game, just to show what’s possible.
As noted by the PacSec member, Dragos Ruiu, it was a “one-shot exploit” which “did everything in one go instead of chaining multiple vulnerabilities”.
Another day, another headache.
Now here is something to cheer you up before the weekend. As it turns out, a critical security vulnerability (CVE-2015-7645), affecting all Flash versions on all operating systems (Windows, Linux and OS X), has been recently discovered and is already exploited by various web sites.
The only way to protect yourself? Uninstall Adobe Flash, as the company is said to be releasing patch only sometime next week.
The sense of adventure never ends with Adobe.
It’s time to enhance your privacy.
Recently, Mozilla has published the beta version of Firefox 42 web browser, which includes some very welcome changes and new features.
One of which will inform about the annoying tab that is playing music and allow you to mute it.
However, as far as the privacy enhancements go (the main point of Firefox 42), it now protects users from the third party tracking when using Private Browsing mode. In addition to that, there is a Control Center for Private Browsing, where you can control site settings and security in one place.
You are the product.
If you are on Windows 8 or 10 and for some reason decided not to use Security Essentials / Windows Defender and have switched to AVG anti-virus instead, then good news for advertisers: they now have your browsing and search history as well meta data, your ISP and apps that are installed on your computer.
Does not appear to be as bad as one might think.
Bugzilla, a bug tracker that is used by Mozilla, Webkit, FreeBSD, the Linux kernel, Apache and many other vendors, has been recently compromised.
As detailed in the blog post, the attacker broke into one of the accounts and gained access to the security sensitive data. Mozilla also believes that the newly acquired information then was used to attack Firefox users. On a positive note, it looks like the vulnerability that he or she reportedly exploited has already been patched at the end of August.
Details are now published online.
Now here is something that does not exactly help the “buggy and old” IE public perception. Back in November and earlier this year in January, Microsoft was notified about the 4 security vulnerabilities that affect both Internet Explorer for desktop as well as smartphones and never bothered to fix them.
In fact, the software giant has now stated that they failed to do so because “there were no attacks reported”, hence they did not bother to do so, not to mention that Internet Explorer will also be replaced with Microsoft Edge later this year.
Now here is an interesting piece of news for all the tech (aka Flash hating) enthusiasts out there.
Unless you have been disconnected from the Internet for the last week or so, then the Hacking Team / Adobe Flash exploit leaks should be pretty known to you. Now, according to various reports, people are starting to see Flash disabled by default with the following pop-up displayed at the top of the page:
Firefox has prevent the unsafe plugin “Adobe Flash” from running on www.domain.com.
And everyone was vulnerable.
It seems like Flash has more security holes than the Swiss cheese and thanks to a recent leak, every single one of computers running it were vulnerable to a new attack.
The news come after the breach of the “Hacking Team”, an Italian spyware manufacturer, which have had clients (mostly governments) from all over the world. As it turns out, in more than 400 gigabytes of published data, there was a yet unknown Flash vulnerability, which too got revealed and allowed anyone (with some tech knowledge) to exploit computers running Adobe Flash 188.8.131.52 or earlier.
Adobe Flash Player 184.108.40.206.
Ah, Adobe Flash, the plugin that every single one of us loves to death, thanks to a never ending streak of security vulnerabilities and all kinds of issues. One might wonder, how many more are there left.
However, while most are routinely fixed and rolled out in batches, earlier this week Adobe was forced to release a critical update to machines running Windows, Mac and Linux as the latest vulnerability is extremely serious and has been already exploited by various hackers worldwide.
Without any consent.
If there is one thing that Google does not need is more negative press related to its user’s privacy invasion. However, this is exactly what they just got, thanks to a recently discovered “bug”.
According to a new report, after upgrading to Chromium 43, some users have noticed that it has silently started downloading the extension called “Chrome Hotword Shared Module”, which has a binary but no source code. While it is unknown what exactly does the black box do, the investigation has revealed that it grants itself permission to activate the microphone and start audio capture.