article thumbnail

Weekly Update 165

Troy Hunt

References Scott Helme is running my Hack Yourself First workshop in Amsterdam on Dec 9 & 10 (he's getting awesome reviews on these too) Apparently, FinecoBank in Italy reckons you should Google your password and not use it if it appears 10 times or more (no, just don't) You'll also need to pay FinecoBank € 0.95

VPN 178
article thumbnail

Security Affairs newsletter Round 377

Security Affairs

Greek intelligence service used surveillance malware to spy on a journalist, Reuters reports Slack resets passwords for about 0.5% of its users due to the exposure of salted password hashes Twitter confirms zero-day used to access data of 5.4

Spyware 123
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ferocious Kitten: 6 years of covert surveillance in Iran

SecureList

It is interesting to note that an active Keepass (password manager) process gets killed before starting the keylogger. This is likely intended to force the user to restart the program and enter a master password that is then stolen via the keylogger. argument: path to file to upload. – List files and repositories.

article thumbnail

Patch now! Insecure Hikvision security cameras can be taken over remotely

Malwarebytes

Its business activities include the provision of services for hard disk recorders, video codes, video servers, surveillance cameras, monitoring of ball machine, road mounts and other products, as well as security services. No username or password is needed, nor are any actions needed from the camera owner. The post Patch now!

Firmware 132
article thumbnail

What is Shoulder Surfing?

Identity IQ

The objective of shoulder surfing is to steal sensitive information such as passwords, credit card numbers, or personal identification numbers (PINs) that can later be used to access the victim’s accounts. So, you enter your username and password and carry on. Avoid Reusing Passwords. Utilize a Secure Password Manager.

article thumbnail

Overview of IoT threats in 2023

SecureList

Attack vectors There are two main IoT infection routes: brute-forcing weak passwords and exploiting vulnerabilities in network services. A successful password cracking enables hackers to execute arbitrary commands on a device and inject malware. Unfortunately, users tend to leave these passwords unchanged.

IoT 86
article thumbnail

The Zero Click, Zero Day iMessage Attack Against Journalists

SecureWorld News

Pegasus spyware is a phone surveillance solution that enables customers to remotely exploit and monitor devices. The company sells its surveillance technology to governments around the world. And watchdog groups say its products are often found to be used in surveillance abuses.

Spyware 52