Exploit This

Security News, Exploits, and Vulnerabilities.

Kaspersky Security Bulletin 2018. Top security stories

All too often, both rely on manipulating human psychology as a way of compromising entire systems or individual computers. Increasingly, the devices targeted also include those that we don’t consider to be computers – from children’s toys to security cameras. Here is our annual round-up of major incidents and key trends from 2018

A study of car sharing apps

The growing popularity of car sharing services has led some experts to predict an end to private car ownership in big cities. But information security specialists have started raising some pertinent questions: how are the users of these services protected and what potential risks do they face in the event of unauthorized access to their accounts?

I know where your pet is

It would seem that no gadget has escaped the attention of hackers, yet there is one last bastion: “smart” devices for animals. For example, trackers to monitor their location.

Research on unsecured Wi-Fi networks across the world

Confidential data can be protected by encrypting traffic at wireless access points. In fact, this method of protection is now considered essential for all Wi-Fi networks. But what actually happens in practice?

Gugi: from an SMS Trojan to a Mobile-Banking Trojan

In the previous article, we described the mechanisms used by Trojan-Banker.AndroidOS.Gugi.c to bypass a number of new Android 6 security features. In this article, we review the entire Gugi mobile-banking Trojan family in more detail.

Banking Trojan, Gugi, evolves to bypass Android 6 protection

We have found a new modification of the mobile banking Trojan, Trojan-Banker.AndroidOS.Gugi.c that can bypass two new security features added in Android 6: permission-based app overlays and a dynamic permission requirement for dangerous in-app activities such as SMS or calls. The modification does not use any vulnerabilities, just social engineering.

Surges in mobile energy consumption during USB charging and data exchange

Is it possible to measure the energy consumed by a host and mobile when they exchange data over the USB connection? We could find in-depth research on energy consumption for USB data transfer, so we decided to carry out our own experiment.

Wired Mobile Charging – Is it Safe?

How safe is it to charge your phone using USB ports? Our experiment shows that it is far from being safe – it comes with risks of losing data or even gaining access to the device by cybercriminal.

Wake up! You’ve been p0wned

Be careful when selecting apps and when it comes to your much-loved devices.

Point of view: Hacker Halted 2015

The Hacker Halted USA event organized by the professional organization EC-Council is held once a year and it brings together technical experts in the field of information security as well as a business audience.

%d bloggers like this: