Remove Authentication Remove Internet Remove Surveillance
article thumbnail

Cell Phone Location Privacy

Schneier on Security

It protects users from fake cell phone towers (IMSI-catchers) and surveillance by cell providers. Monthly: The user pays their bill to the MVNO (credit card or otherwise) and the phone gets anonymous authentication (using Chaum blind signatures) tokens for each time slice (e.g., It’s a clever system. All MVNO SIMs are identical.

article thumbnail

Netgear Routers' Flaws Expose Users to Malware, Remote Attacks, and Surveillance

The Hacker News

As many as five security flaws have been disclosed in Netgear RAX30 routers that could be chained to bypass authentication and achieve remote code execution.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Adobe, Apple, Google & Microsoft Patch 0-Day Bugs

Krebs on Security

Citizen Lab says the bug it discovered was being exploited to install spyware made by the Israeli cyber surveillance company NSO Group. Tom Bowyer , manager of product security at Automox , said exploiting this vulnerability could lead to the disclosure of Net-NTLMv2 hashes , which are used for authentication in Windows environments.

Spyware 301
article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.

article thumbnail

5 pro-freedom technologies that could change the Internet

Malwarebytes

After a good start, the Internet-enabled, technological revolution we are living through has hit some bumps in the road. To celebrate Independence Day we want to draw your attention to five technologies that could improve life, liberty and the pursuit of happiness on the Internet. Passwordless authentication. DNS encryption.

Internet 121
article thumbnail

European firm DSIRF behind the attacks with Subzero surveillance malware

Security Affairs

The Microsoft Threat Intelligence Center (MSTIC) and the Microsoft Security Response Center (MSRC) researchers linked a threat group known as Knotweed to an Austrian surveillance firm named DSIRF, known for using multiple Windows and Adobe zero-day exploits. Follow me on Twitter: @securityaffairs and Facebook. Pierluigi Paganini.

article thumbnail

Planet WGS-804HPT Industrial Switch flaws could be chained to achieve remote code execution

Security Affairs

The Planet WGS-804HPT industrial switch is used in building and home automation networks to provide connectivity of Internet of things (IoT) devices, IP surveillance cameras, and wireless LAN network applications. This switch family is equipped with a web service and SNMP management interface.