07 Jan 2020

Burner phones are an eavesdropping risk for international travelers

In order to limit the risk of exposing sensitive business data while abroad, international business travelers can use of burner phones with a minimal data footprint. However, Michael Campbell of Privoro warns that because those phones are used only for a single trip and contain as little valuable data as

Read More
21 Oct 2019

Alexa and Google Home abused to eavesdrop and phish passwords

Threat actors can use malicious applications in order to eavesdrop on Amazon Alexa and Google Home users, researchers with Security Research Labs have discovered. Rogue applications can also be used to carry out phishing attacks targeting owners of one of these voice assistants. The two attacks developed by the researchers

Read More
07 Oct 2019

Signal Rushes to Patch Serious Eavesdropping Vulnerability

A security flaw in the privacy-focused encrypted messaging service Signal could enable a threat actor to listen to the audio stream recorded by the Android device of another Signal user, without their knowledge. The vulnerability, tracked as CVE-2019-17191, closely resembles a FaceTime flaw that was discovered earlier this year. Attackers

Read More
06 Sep 2019

600,000 GPS trackers for people and pets are using 123456 as a password

Security researchers with Avast have discovered a range of critical flaws affecting around 600,000 GPS trackers designed for monitoring the location of children, seniors, and pets. The flaws include the presence of the same default password (123456) in all devices and the insecure transmission of data in plaintext. The vulnerabilities

Read More
16 Aug 2019

Critical Bluetooth flaw opens millions of devices to eavesdropping attacks

Security researchers have uncovered a serious flaw in the Bluetooth Core Specification that can enable attackers to capture and meddle with Bluetooth communications between impacted devices. The vulnerability, tracked as CVE-2019-9506, has already been fixed in many devices. According to the research report[pdf], the Key Negotiation Of Bluetooth (KNOB) attack

Read More