Weird and wild cutting edge Security Threats - 1
shlok.info
Weird and wild cutting edge Security Threats
Weird and wild cutting edge Security Threats
1. New tech new bugs new headaches
When you think of security vulnerabilities, the first thing that likely comes to your mind are flaws in Windows or apps like Adobe Reader that let hackers wreak havoc on your PC. But computers are everywhere these days, and with more computers come more security headaches. Join us as we look at ten hacks and vulnerabilities that take threats to the next level. Somehow, things have gotten even crazier since our last look at shocking security exploits.
2. Hackers crack the car
In car navigation and infotainment systems can deeply improve the driving experience, but they can also open up your car to security issues that you might never have imagined. Case in point: In July, security researchers Charlie Miller and Chris Valasek managed to control a Jeep Cherokee s acceleration and braking among other things via the Internet. The pair exploited a vulnerability in the Jeep s Uconnect in dash infotainment system, and used a smartphone to remotely brake the car while it was being driven. The hack took Miller and Valasek three years of work to pull off. The fact that someone could take control of a car through a hole in the infotainment system is worrisome, though, and the hack was serious enough that Fiat Chrysler recalled 1.4 million vulnerable vehicles.
3. Hacked electric skateboard makes riders eat pavement
But the automobile isn t the only mode of transportation that is potentially vulnerable to hacking. In early August, researchers Richo Healy and Mike Ryan demonstrated how theycould remotely control an electric skateboard?by exploiting the unsecured Bluetooth connection between the board and the remote used to control it.
4. Malware gets into your BIOS
When you think of malware, you probably think of viruses, spyware, and trojans that infect your PC at the OS level. But there s a whole class of emerging malware that targets your PC s underlying firmware. A piece of malware called badBIOS doesn't just infect a PC s BIOS it's also nearly impossible to completely eradicate. According to researchers, badBIOS can persist on your system, even if you flash your BIOS. As a result, traditional detection and removal methods are useless against badBIOS. Because malware that targets firmware sidesteps the operating system, pretty much any PC may be vulnerable, even if you run an OS for which very little malware exists. Last month, for example, researchers showed how malware can attack the EFI firmware that Apple uses on Macs.
5. Malware that uses sound to jump air gaps
BadBIOS had one other sinister trick up its sleeve: Although the malware spreads via infected USB flash drives, researchers believed that it communicates with other infected computers via high frequency audio signals.Researchers say that it s only one of several possible ways malware could communicate with other infected machines without the aid of a network connection.



  • Test your English Language
  • Comics of the Day
  • Places to Visit in Washington
  • Most Iconic Bollywood Actress
  • Tips to Feng Shui Your Home
  • Incredible Sea Arches Around the World
  • Best Marwari Mehndi Designs
  • Best Gadgets For Summer Travel
  • Mind Blowing Indian Mehndi Designs
  • Unusual Sports in The World
  • The Quick and Healthy Breakfasts
  • Most Powerful Cars on the Market
  • Shlok Consultants