article thumbnail

KindleDrip exploit – Hacking a Kindle device with a simple email

Security Affairs

The researchers noticed that the “Send to Kindle” feature allows Kindle users to send e-books to their devices as email attachments, a behavior that could be potentially exploited for malicious purposes, for example sending a malicious e-book to potential victims. To my pleasant surprise, the e-book appeared on the device!

Hacking 133
article thumbnail

Hackers exploit 3-years old flaw to wipe Western Digital devices

Security Affairs

Threat actors are wiping many Western Digital (WD) My Book Live and My Book Live Duo NAS devices likely exploiting an old vulnerability. Owners of Western Digital (WD) claim that their My Book Live and My Book Live Duo network-attached storage (NAS) devices have been wiped. SecurityAffairs – hacking, Western Digital).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Broadcom WiFi Driver bugs expose devices to hack

Security Affairs

It is also likely you use a Broadcom WiFi chip if you have an iPhone, a Mac book, a Samsumg phone or a Huawei phone, etc.” Anguelkov confirmed that two of those vulnerabilities affect both in the Linux kernel and firmware of affected Broadcom chips. In this case, firmware event frames from a remote source will be processed. •

Hacking 89
article thumbnail

WizCase Report: Vulnerabilities found in WD My Book, NetGear Stora, SeaGate Home, Medion LifeCloud NAS

Security Affairs

Security researchers from WizCase have discovered several vulnerabilities in WD My Book, NetGear Stora, SeaGate Home, Medion LifeCloud NAS. WD My Book, NetGear Stora. CVE-2018-18472 – XXE and Unauthenticated Remote Command Execution in Axentra Hipserv NAS firmware. . Firmware Analysis. Summary of Our Findings.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In this episode of The Hacker Mind , Beau Woods and Paulino Calderon discuss their book, Practical IoT Hacking, and talk about IoT threat models, the technologies being used today, and what tools and knowledge you need to get started successfully hacking IoT devices. It's a comprehensive book, and it's an important topic.

IoT 52
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In this episode of The Hacker Mind , Beau Woods and Paulino Calderon discuss their book, Practical IoT Hacking, and talk about IoT threat models, the technologies being used today, and what tools and knowledge you need to get started successfully hacking IoT devices. It's a comprehensive book, and it's an important topic.

IoT 52
article thumbnail

Third Party Cyber Risk is growing. Most Companies aren’t prepared.

The Security Ledger

Third party cyber risk is a growing concern for organizations, as breaches and hacks tied to third party providers and applications multiply. Our new e-book, sponsored by CyberGRX, will help you figure it out! Cognitive Bias is the Threat Actor you may never detect Huge Survey of Firmware Finds No Security Gains in 15 Years.