Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @SecReLabs
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SecReLabs
-
Prikvačeni tweet
We found multiple attacks on RCS, ranging from remote text message intercept to local MitM. Vulnerabilities lie in misconfigured deployments and the official Android messaging app. We present our attacks and how to fix them
@BlackHatEvents and@deepsec. https://srlabs.de/bites/rcs-hacking/ …pic.twitter.com/b1ZUY8Efbk
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
We wanted to do a company survey via Microsoft forms. In the end our colleague
@alyanwarr got acknowledged by@msftsecresponse for two formula injections... https://portal.msrc.microsoft.com/en-us/security-guidance/researcher-acknowledgments-online-services … (December 2019)Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
We are looking forward to see our colleague
@_cwerling on stage at#36c3 later today. PS: Look out for the two SRLabs logos in the slides :)https://twitter.com/_cwerling/status/1210514095398686720 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
We did another test run on our smart speaker attacks from October. Turns out that – besides promises to prevent such attacks – both Amazon and Google still approve our malicious Skills/Actions for their stores.
#smartspieshttps://threatpost.com/alexa-google-home-eavesdropping-hack-not-yet-fixed/151164/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Today we are presenting our extended set of vulnerabilities in RCS at
@BlackHatEvents in London. In this interview with@TheParallax, Karsten discusses how carriers are repeating the same old - previously solved - security problems in brand new technology:https://the-parallax.com/2019/12/03/rcs-security-vulnerabilities/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Some more details on the attacks can be found on our blog: https://srlabs.de/bites/rcs-hacking/ …https://twitter.com/josephfcox/status/1200300431345369088 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Live view from our colleague
@vinulium who is working hard to finish the slides for@CodemoBerlin next week. On November 13, he will talk about#fuzzing and how to integrate it into your software development life cycle to make your code more secure!pic.twitter.com/wuERBmXY8T
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Our team member Stephan (
@stze) identified a remote unauthenticated DoS vulnerability (CVE-2019-18217) in ProFTPD before 1.3.7rc2, with the use of one of his favorite tools#honggfuzz. He is happy to explain more, so get in touch with him when interested!https://twitter.com/CVEnew/status/1186141041843474432 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
4. Use 2-factor authentication to additionally protect your accounts in case of a lost password
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
3. Only use trusted third-party Actions/Skills that have been reviewed by many others (and hope that the assistant understands you correctly)
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
2. Always check the LED indicator for activity when you expect the assistant to be inactive
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Four tips to protect yourself against our latest attacks: 1. Do not give your passwords to voice assistants. Google and Amazon would never ask for ithttps://twitter.com/CNN/status/1186434770244378629 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Thank you
@dangoodin001 for explaining the Smart Spies hacks better than we ever could at@arstechnica!https://arstechnica.com/information-technology/2019/10/alexa-and-google-home-abused-to-eavesdrop-and-phish-passwords/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
More information and videos showcasing these attacks at https://srlabs.de/bites/smart-spies/ …https://twitter.com/evacide/status/1186077340343816192 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Security Research Labs proslijedio/la je Tweet
Alexa and Google Home devices leveraged in new phishing and eavesdropping scenarios Issues not fixed, months after being reported. https://www.zdnet.com/article/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again/ …pic.twitter.com/UAsgMjNWBK
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Security Research Labs proslijedio/la je Tweet
"
@SecReLabs discovered that by adding the '�. ' (U+D801, dot, space) character sequence to various locations inside the backend of a normal Alexa/Google Home app, they could induce long periods of silence during which the assistant remains active."https://www.zdnet.com/article/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
New hack released today: Smart Spies. Amazon Alexa and Google Home enable eavesdropping and vishing (voice-phishing). More information and videos showcasing these attacks at https://srlabs.de/bites/smart-spies/ …pic.twitter.com/IN5bpHSINd
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Many people own "smart" devices like TV's or doorbells. Knowing that these devices watch and track us, do you believe it is worth having such a device in your home?https://twitter.com/random_walker/status/1177570679232876544 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Check whether your SIM is vulnerable with
#SIMtester and monitor whether you are under active attack by using#SnoopSnitch.https://twitter.com/campuscodi/status/1177693392542863360 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The Simjacker hack puts 6% of SIM cards at risk according to six years of research measurements. A new SIM hack puts another 3.5% at risk. Check whether your SIM is vulnerable with SIMtester. Monitor whether you are under active attack using SnoopSnitch. https://srlabs.de/bites/sim_attacks_demystified/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.