Tag: Government

IOActive researchers extracted firmware from the Linksys smart wifi router and discovered 10 security vulnerabilities. (Photo courtesy of IOActive.)

Bot Fodder: 20 Models of Linksys Routers Vulnerable to remote Hacks

In-brief: serious security flaws affect 20 models of wireless routers manufactured by the firm Linksys, just the latest report to underscore security flaws in ubiquitous networking hardware that is used by homes and small businesses, the firm IOActive disclosed on Thursday.

Sirens by the firm Federal Signal were hacked and set off in Dallas. But what role - if any - did computer tampering play in the incident?

Podcast: Hack, or Phreak – What Really Happened in Dallas?

In-brief: The April 7th hijacking of more than 100 civil defense sirens in Dallas was dismissed as an “old school” hack that relied copycat radio tones to set off a cacophony that lasted for nearly two hours. But was it? Security researcher Mark Loveless (aka “Simple Nomad”) has his doubts about the official explanation. In this latest Security Ledger podcast, he talks to Editor in Chief Paul Roberts about what might have really gone down in Dallas. 

A warning letter from the FDA to St. Jude Medical said the firm ignored warnings that its implantable medical devices and related software were vulnerable to hacking or unexpected failure.

Update: FDA says St. Jude Medical knew about Device Flaws 2 Years Before Muddy Waters Report

In-brief: In a damning report, the FDA said that St. Jude Medical* knew about serious security flaws in its implantable medical devices as early as 2014, but failed to address them with software updates or other mitigations, or by replacing those devices. (Editor’s note: updated to include a statement from Abbott and comment from Dr. Kevin Fu. – PFR April 14, 2017)

Hacking tools belonging to the CIA were leaked via the site Wikileaks. What have we learned from the release?

Leaked CIA Tools Linked to Known Cyber Espionage Group | Symantec

In-brief: We don’t know if the Vault 7 tools belonged to the CIA. We do know that they were used by a group Symantec dubbed Longhorn that possessed powerful zero day exploits, never attacked computers in the US and used code words taken from lyrics by 80s band The Police, so…

As the Chinese President meets at Mar a Lago with President Trump, reports of more Chinese hacking of the US and its allies has surfaced in two reports.

As Trump and Xi Meet, Reports of China-Sponsored Hacks Flare | Digital Guardian

In-brief: On the eve of a high-profile meeting between China’s President Xi Jinping and U.S. President Donald Trump, new reports underscore the continued scourge of Chinese spying on- and theft from the U.S. and its allies. (Editor’s note: this post is excerpted from one that appeared on Digital Guardian’s blog.)