[SecurityWeek] Researchers Create Toolkit for Hardware Security Tests on Apple’s Mobile Processors

A group of researchers from North Carolina State University has built a software toolkit to explore vulnerabilities in Apple’s mobile processors and used the findings to devise a cache timing attack.

read more

Source: Read More (SecurityWeek RSS Feed)

You might be interested in …

[ESET] Popular Wi‑Fi routers still using default passwords making them susceptible to attacks

All posts, ESET feed

To mitigate the chances of their Wi-Fi home routers being compromised, users would do well to change the manufacturer’s default access credentials The post Popular Wi‑Fi routers still using default passwords making them susceptible to attacks appeared first on WeLiveSecurity Source: Read More (WeLiveSecurity)

Read More

[HackerNews] Cybercriminals Abusing Internet-Sharing Services to Monetize Malware Campaigns

All posts, HackerNews

Threat actors are capitalizing on the growing popularity of proxyware platforms like Honeygain and Nanowire to monetize their own malware campaigns, once again illustrating how attackers are quick to repurpose and weaponize legitimate platforms to their advantage. “Malware is currently leveraging these platforms to monetize the internet bandwidth of victims, similar to how malicious Source: Read More […]

Read More

Daily NCSC-FI news followup 2020-05-29

Highly-targeted attacks on industrial sector hide payload in images www.bleepingcomputer.com/news/security/highly-targeted-attacks-on-industrial-sector-hide-payload-in-images/ Attackers looking to steal employee credentials from organizations tied to the industrial sector deployed highly-targeted operations that delivered malicious PowerShell scripts in images. Victims in multiple countries (Japan, the U.K., Germany, Italy) were identified. Some of them supply equipment and software solutions to industrial enterprises. […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.