Security Affairs newsletter Round 22 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box.

ZigBee-sniffing drone used to map online Internet of Things
RollJam, a $30 device to unlock the majority of car doors
Tesla tech top dog downs slug of Scotch, increases bug bounty to $10k
Carphone Warehouse hacked: 2.4 million customer records at risk
Hackers show off long-distance Wi-Fi radio proxy at DEF CON
Hacking airport security systems with a common laptop
Hackers can remotely steal fingerprints from Android devices
Certifi-Gate, a new Android flaw allows hackers to control your mobile
Mozilla Patches Bug Used in Active Attacks
IT giants join forces to combat child sexual abuse imagery
Aerial Assault Drone, the new Hacking Weapon presented at the Defcon
Jail incompetent council folk who leak our data, thunders furious BBW
Intel left a fascinating security flaw in its chips for 16 years – heres how to exploit it
Asprox botnet, a long-running nuisance, disappears
Retailer Freds found payment card malware on two servers
VBE files on the rise in Brazil leading to Financial Fraud
New IP address blacklist based on Web chatter
Kali Linux 2.0 Released — Download Most Powerful Penetration Testing Platform
Symantec finally sells Veritas for $8 billion to investment group
Why you should stop worrying about online privacy
Huge Flash Update Patches More Than 30 Vulnerabilities
Doubts cast on Islamic States so-called leak of US .mil, .gov passwords
Hillary Clinton kept top-secret SIGINT emails on her home email server
US Busts Hacking/Insider Trading Ring
Microsoft Security Updates August 2015
Ten years after the sellout, Black Hat is solidly corporate and that’s fine
Facebook API flaw Left 1.44 Billion Users’ Identities at risk
Researchers reveal electronic car lock hack after 2-year injunction by Volkswagen
The Most Vicious Zero-Day Exploit? Insiders.
Firefox 40 Begins Warning Users About Unsigned Add-Ons
Darkhotel APT group relied also on Hacking Team’s exploits
Apple and Google are KILLING KIDS with encryption, whine lawyers
Chinese Hackers still have access to email of Top US Officials
5 child geniuses destined for a career in cybersecurity
Securing OS X: Apple, Security Vendors Need To Up Their Game
Vulnerabilities Identified in Several WordPress Plugins
Lenovo used Windows anti-theft feature to install persistent crapware
Attackers exploit a Windows flaw using a booby-trapped USB
Flaw in Salesforce Subdomain Enabled Phishing Attacks
The Man demands yet more account information from Twitter
Corvette hacked with a text message
Wanna harvest strangers Facebook data? Get a mobile number and off you go
Patching a fragmented, Stagefrightened Android isnt easy
Lenovo Caught Using Rootkit to Secretly Install Unremovable Software
Hack Satellite Connection and Surf Anonymously with High-speed Internet
John McAfee launches cert authority but its got a POODLE problem
Dropbox adds USB two factor authentication for paranoid Chrome users
Cisco network kit warning: Watch out for malware in the firmware
Even when told not to, Windows 10 just can’t stop talking to Microsoft
Malvertising set to wreak one BEELLION dollars in damage this year
New Docker crypto locker is a blocker for Docker image mockers
Security industry reacts to Oracle’s CSO missive
Facebook Awards $100,000 for New Class of Vulnerabilities and Detection Tool
Yet malicious software found on Lenovo PCs
The Summer Of Car Hacks Continues
Zero Day in Android’s Google Admin App Can Bypass Sandbox
ISP’s e-mail password reset system is a guy named Shawn
Cisco warns hackers are installing malicious ROMMON images on its devices
Researchers Find 1PB of Data Exposed by Misconfigured Databases
China laments wild guesses and malicious slurs on state hacking
OwnStar Wi-Fi attack now grabs BMW, Mercedes, and Chrysler cars’ virtual keys
Ransomware Attacks Threaten Wearable Devices and Internet of Things
Google has another try at patching Stagefright flaw
Apple Releases Patch for OS X Vulnerability Exploited in the Wild
Windows 10 Doesnt Stop Spying You, Even After Disabling Its Creepy Features
OpenSSH 7.0 Fixes Four Flaws and other issues
Your router: Gateway for hackers
Cyber Intelligence-as-a-Service: In-House vs. Outsource Dilemma
Apple releases major security updates
Ive seen Kaspersky slap his staff with a walrus penis – and even I doubt the false-positive claims
Zero-Day in the Google Admin App can bypass Android sandbox
Kaspersky accused of sabotage to harm competitors
Parrot drones easily taken down or hijacked, researchers demonstrate

Email address: Hurry up, subscribe to the newsletter, next Sunday you will receive all the news directly in your inbox.

Once again thank you!

Pierluigi Paganini

(Security Affairs – Newsletter, SecurityAffairs)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity

The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the…

6 hours ago

A cyber attack paralyzed operations at Synlab Italia

A cyber attack has been disrupting operations at Synlab Italia, a leading provider of medical…

7 hours ago

Russia-linked APT28 used post-compromise tool GooseEgg to exploit CVE-2022-38028 Windows flaw

Russia-linked APT28 group used a previously unknown tool, dubbed GooseEgg, to exploit Windows Print Spooler…

17 hours ago

Hackers threaten to leak a copy of the World-Check database used to assess potential risks associated with entities

A financially motivated group named GhostR claims the theft of a sensitive database from World-Check…

1 day ago

Windows DOS-to-NT flaws exploited to achieve unprivileged rootkit-like capabilities

Researcher demonstrated how to exploit vulnerabilities in the Windows DOS-to-NT path conversion process to achieve…

1 day ago

A flaw in the Forminator plugin impacts hundreds of thousands of WordPress sites

Japan's CERT warns of a vulnerability in the Forminator WordPress plugin that allows unrestricted file uploads…

1 day ago

This website uses cookies.