<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber Security March 2019</title>
	<atom:link href="http://www.epanorama.net/blog/2019/03/01/cyber-security-march-2019/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2019/03/01/cyber-security-march-2019/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 22 Apr 2026 18:32:18 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/03/01/cyber-security-march-2019/comment-page-10/#comment-1632407</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Apr 2019 10:24:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181892#comment-1632407</guid>
		<description><![CDATA[Huawei savaged by Brit code review board over pisspoor dev practices
HCSEC pulls no technical punches in annual report
https://www.theregister.co.uk/2019/03/28/hcsec_huawei_oversight_board_savaging_annual_report/

Britain&#039;s Huawei oversight board has said the Chinese company is a threat to British national security after all – and some existing mobile network equipment will have to be ripped out and replaced to get rid of said threat.

&quot;The work of HCSEC [Huawei Cyber Security Evaluation Centre]… reveals serious and systematic defects in Huawei&#039;s software engineering and cyber security competence,&quot; said the HCSEC oversight board in its annual report, published this morning.]]></description>
		<content:encoded><![CDATA[<p>Huawei savaged by Brit code review board over pisspoor dev practices<br />
HCSEC pulls no technical punches in annual report<br />
<a href="https://www.theregister.co.uk/2019/03/28/hcsec_huawei_oversight_board_savaging_annual_report/" rel="nofollow">https://www.theregister.co.uk/2019/03/28/hcsec_huawei_oversight_board_savaging_annual_report/</a></p>
<p>Britain&#8217;s Huawei oversight board has said the Chinese company is a threat to British national security after all – and some existing mobile network equipment will have to be ripped out and replaced to get rid of said threat.</p>
<p>&#8220;The work of HCSEC [Huawei Cyber Security Evaluation Centre]… reveals serious and systematic defects in Huawei&#8217;s software engineering and cyber security competence,&#8221; said the HCSEC oversight board in its annual report, published this morning.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/03/01/cyber-security-march-2019/comment-page-10/#comment-1632406</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Apr 2019 10:21:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181892#comment-1632406</guid>
		<description><![CDATA[Equifax, FICO launch Data Decision Cloud as credit scores meld with marketing, compliance, customer experience
https://www.zdnet.com/article/equifax-fico-launch-data-decision-cloud-as-credit-scores-meld-with-marketing-compliance-customer-experience/?ftag=COS-05-10aaa0g&amp;utm_campaign=trueAnthem:+Trending+Content

By combining data pools and platforms, the companies hope to find more insights, build better predictive models and manage customer experiences better.]]></description>
		<content:encoded><![CDATA[<p>Equifax, FICO launch Data Decision Cloud as credit scores meld with marketing, compliance, customer experience<br />
<a href="https://www.zdnet.com/article/equifax-fico-launch-data-decision-cloud-as-credit-scores-meld-with-marketing-compliance-customer-experience/?ftag=COS-05-10aaa0g&#038;utm_campaign=trueAnthem:+Trending+Content" rel="nofollow">https://www.zdnet.com/article/equifax-fico-launch-data-decision-cloud-as-credit-scores-meld-with-marketing-compliance-customer-experience/?ftag=COS-05-10aaa0g&#038;utm_campaign=trueAnthem:+Trending+Content</a></p>
<p>By combining data pools and platforms, the companies hope to find more insights, build better predictive models and manage customer experiences better.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/03/01/cyber-security-march-2019/comment-page-10/#comment-1632335</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 31 Mar 2019 21:20:37 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181892#comment-1632335</guid>
		<description><![CDATA[NSA-Inspired Vulnerability Found in Huawei Laptops
https://www.schneier.com/blog/archives/2019/03/nsa-inspired_vu.html

This is an interesting story of a serious vulnerability in a Huawei driver that Microsoft found. The vulnerability is similar in style to the NSA&#039;s DOUBLEPULSAR that was leaked by the Shadow Brokers -- believed to be the Russian government -- and it&#039;s obvious that this attack copied that technique.]]></description>
		<content:encoded><![CDATA[<p>NSA-Inspired Vulnerability Found in Huawei Laptops<br />
<a href="https://www.schneier.com/blog/archives/2019/03/nsa-inspired_vu.html" rel="nofollow">https://www.schneier.com/blog/archives/2019/03/nsa-inspired_vu.html</a></p>
<p>This is an interesting story of a serious vulnerability in a Huawei driver that Microsoft found. The vulnerability is similar in style to the NSA&#8217;s DOUBLEPULSAR that was leaked by the Shadow Brokers &#8212; believed to be the Russian government &#8212; and it&#8217;s obvious that this attack copied that technique.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/03/01/cyber-security-march-2019/comment-page-10/#comment-1632317</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 31 Mar 2019 17:42:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181892#comment-1632317</guid>
		<description><![CDATA[Alex W. Palmer / Wired: 	
A behind-the-scenes account of how a member of TripAdvisor&#039;s anti-fraud team helped the FCC track down a Florida man accused of making 96M+ illegal robocalls  —  BRAD YOUNG, A lawyer at TripAdvisor, arrived at the company&#039;s offices in Needham, Massachusetts, on October 12, 2015 … 
https://www.wired.com/story/on-the-trail-of-the-robocall-king/]]></description>
		<content:encoded><![CDATA[<p>Alex W. Palmer / Wired:<br />
A behind-the-scenes account of how a member of TripAdvisor&#8217;s anti-fraud team helped the FCC track down a Florida man accused of making 96M+ illegal robocalls  —  BRAD YOUNG, A lawyer at TripAdvisor, arrived at the company&#8217;s offices in Needham, Massachusetts, on October 12, 2015 …<br />
<a href="https://www.wired.com/story/on-the-trail-of-the-robocall-king/" rel="nofollow">https://www.wired.com/story/on-the-trail-of-the-robocall-king/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/03/01/cyber-security-march-2019/comment-page-10/#comment-1632316</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 31 Mar 2019 17:41:36 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181892#comment-1632316</guid>
		<description><![CDATA[Mark Zuckerberg / Washington Post: 	
Mark Zuckerberg calls for global regulations in four areas: policing harmful content, election integrity, a GDPR-like privacy framework, and data portability  —  Mark Zuckerberg is founder and chief executive of Facebook.  —  Technology is a major part of our lives, and companies such as Facebook have immense responsibilities.
http://www.washingtonpost.com/opinions/mark-zuckerberg-the-internet-needs-new-rules-lets-start-in-these-four-areas/2019/03/29/9e6f0504-521a-11e9-a3f7-78b7525a8d5f_story.html]]></description>
		<content:encoded><![CDATA[<p>Mark Zuckerberg / Washington Post:<br />
Mark Zuckerberg calls for global regulations in four areas: policing harmful content, election integrity, a GDPR-like privacy framework, and data portability  —  Mark Zuckerberg is founder and chief executive of Facebook.  —  Technology is a major part of our lives, and companies such as Facebook have immense responsibilities.<br />
<a href="http://www.washingtonpost.com/opinions/mark-zuckerberg-the-internet-needs-new-rules-lets-start-in-these-four-areas/2019/03/29/9e6f0504-521a-11e9-a3f7-78b7525a8d5f_story.html" rel="nofollow">http://www.washingtonpost.com/opinions/mark-zuckerberg-the-internet-needs-new-rules-lets-start-in-these-four-areas/2019/03/29/9e6f0504-521a-11e9-a3f7-78b7525a8d5f_story.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/03/01/cyber-security-march-2019/comment-page-10/#comment-1632315</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 31 Mar 2019 17:41:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181892#comment-1632315</guid>
		<description><![CDATA[Gavin De Becker / The Daily Beast: 	
Jeff Bezos&#039; security chief says his investigation concluded with high confidence that Saudi Arabia “had access to Bezos&#039; phone, and gained private information”  —  The National Enquirer&#039;s lawyer tried to get me to say there was no hacking. 

Bezos Investigation Finds the Saudis Obtained His Private Data
https://www.thedailybeast.com/jeff-bezos-investigation-finds-the-saudis-obtained-his-private-information

The National Enquirer’s lawyer tried to get me to say there was no hacking.

“Our investigators and several experts concluded with high confidence that the Saudis had access to Bezos’ phone, and gained private information.&quot;

Experts with whom we consulted confirmed New York Times reports on the Saudi capability to “collect vast amounts of previously inaccessible data from smartphones in the air without leaving a trace—including phone calls, texts, emails”—and confirmed that hacking was a key part of the Saudis’ “extensive surveillance efforts that ultimately led to the killing of [Washington Post] journalist Jamal Khashoggi.”

Some Americans will be surprised to learn that the Saudi government has been intent on harming Jeff Bezos since last October, when the Post began its relentless coverage of Khashoggi’s murder. The Saudi campaign against Bezos has already been reported by CNN International, Bloomberg, The Daily Beast, and others.

Saudi Arabia attacks people in many ways, obviously, including through their elaborate social media program that uses sophisticated technology and paid surrogates to create artificially trending hashtags]]></description>
		<content:encoded><![CDATA[<p>Gavin De Becker / The Daily Beast:<br />
Jeff Bezos&#8217; security chief says his investigation concluded with high confidence that Saudi Arabia “had access to Bezos&#8217; phone, and gained private information”  —  The National Enquirer&#8217;s lawyer tried to get me to say there was no hacking. </p>
<p>Bezos Investigation Finds the Saudis Obtained His Private Data<br />
<a href="https://www.thedailybeast.com/jeff-bezos-investigation-finds-the-saudis-obtained-his-private-information" rel="nofollow">https://www.thedailybeast.com/jeff-bezos-investigation-finds-the-saudis-obtained-his-private-information</a></p>
<p>The National Enquirer’s lawyer tried to get me to say there was no hacking.</p>
<p>“Our investigators and several experts concluded with high confidence that the Saudis had access to Bezos’ phone, and gained private information.&#8221;</p>
<p>Experts with whom we consulted confirmed New York Times reports on the Saudi capability to “collect vast amounts of previously inaccessible data from smartphones in the air without leaving a trace—including phone calls, texts, emails”—and confirmed that hacking was a key part of the Saudis’ “extensive surveillance efforts that ultimately led to the killing of [Washington Post] journalist Jamal Khashoggi.”</p>
<p>Some Americans will be surprised to learn that the Saudi government has been intent on harming Jeff Bezos since last October, when the Post began its relentless coverage of Khashoggi’s murder. The Saudi campaign against Bezos has already been reported by CNN International, Bloomberg, The Daily Beast, and others.</p>
<p>Saudi Arabia attacks people in many ways, obviously, including through their elaborate social media program that uses sophisticated technology and paid surrogates to create artificially trending hashtags</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/03/01/cyber-security-march-2019/comment-page-10/#comment-1632220</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 30 Mar 2019 18:57:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181892#comment-1632220</guid>
		<description><![CDATA[Dan Goodin / Ars Technica: 	
A newly published exploit for a Magento vulnerability that can be used without authentication puts hundreds of thousands of e-commerce sites at risk

Brace yourselves: Exploit published for serious Magento bug allowing card skimming [Updated]
Magento admins: Beware of SQL flaw that requires no authentication.
https://arstechnica.com/information-technology/2019/03/severe-magento-bug-opens-300k-commerce-sites-to-card-skimming-attacks/]]></description>
		<content:encoded><![CDATA[<p>Dan Goodin / Ars Technica:<br />
A newly published exploit for a Magento vulnerability that can be used without authentication puts hundreds of thousands of e-commerce sites at risk</p>
<p>Brace yourselves: Exploit published for serious Magento bug allowing card skimming [Updated]<br />
Magento admins: Beware of SQL flaw that requires no authentication.<br />
<a href="https://arstechnica.com/information-technology/2019/03/severe-magento-bug-opens-300k-commerce-sites-to-card-skimming-attacks/" rel="nofollow">https://arstechnica.com/information-technology/2019/03/severe-magento-bug-opens-300k-commerce-sites-to-card-skimming-attacks/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/03/01/cyber-security-march-2019/comment-page-10/#comment-1632218</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 30 Mar 2019 18:55:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181892#comment-1632218</guid>
		<description><![CDATA[CNBC: 	
Researchers find totaled Teslas contain unencrypted and personally revealing data about owners, including locations visited, phone contacts, and dash cam video

Tesla cars keep more data than you think, including this video of a crash that totaled a Model 3
https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html

    Crashed Tesla vehicles, sold at junk yards and auctions, contain deeply personal and unencrypted data including info from drivers’ paired mobile devices, and video showing what happened just before the accident.
    Security researcher GreenTheOnly extracted unencrypted video, phonebooks, calendar items and other data from Model S, Model X and Model 3 vehicles purchased for testing and research at salvage. 
    Hackers who test or modify the systems in their own Tesla vehicles are flagged internally, ensuring that they are not among the first to receive over-the-air software updates first.]]></description>
		<content:encoded><![CDATA[<p>CNBC:<br />
Researchers find totaled Teslas contain unencrypted and personally revealing data about owners, including locations visited, phone contacts, and dash cam video</p>
<p>Tesla cars keep more data than you think, including this video of a crash that totaled a Model 3<br />
<a href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html" rel="nofollow">https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html</a></p>
<p>    Crashed Tesla vehicles, sold at junk yards and auctions, contain deeply personal and unencrypted data including info from drivers’ paired mobile devices, and video showing what happened just before the accident.<br />
    Security researcher GreenTheOnly extracted unencrypted video, phonebooks, calendar items and other data from Model S, Model X and Model 3 vehicles purchased for testing and research at salvage.<br />
    Hackers who test or modify the systems in their own Tesla vehicles are flagged internally, ensuring that they are not among the first to receive over-the-air software updates first.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/03/01/cyber-security-march-2019/comment-page-10/#comment-1632173</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 30 Mar 2019 06:20:20 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181892#comment-1632173</guid>
		<description><![CDATA[Hacker Rigs New Zealand Shooter&#039;s Manifesto With Malware
https://uk.pcmag.com/news/120294/hacker-rigs-new-zealand-shooters-manifesto-with-malware

A hacker is responding to the New Zealand mosque shooting by booby-trapping the attacker&#039;s manifesto with malware.]]></description>
		<content:encoded><![CDATA[<p>Hacker Rigs New Zealand Shooter&#8217;s Manifesto With Malware<br />
<a href="https://uk.pcmag.com/news/120294/hacker-rigs-new-zealand-shooters-manifesto-with-malware" rel="nofollow">https://uk.pcmag.com/news/120294/hacker-rigs-new-zealand-shooters-manifesto-with-malware</a></p>
<p>A hacker is responding to the New Zealand mosque shooting by booby-trapping the attacker&#8217;s manifesto with malware.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/03/01/cyber-security-march-2019/comment-page-10/#comment-1632133</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 29 Mar 2019 21:13:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181892#comment-1632133</guid>
		<description><![CDATA[Here&#039;s the List of ~600 MAC Addresses Targeted in Recent ASUS Hack
https://thehackernews.com/2019/03/asus-hack-mac-addresses.html?m=1

Russian security firm Kaspersky last week didn&#039;t release the full list all MAC addresses that hackers hardcoded into their malware to surgically target a specific pool of users.

offline tool and launched an online web page where ASUS PC users can search for their MAC addresses to check whether they were in the hit list.

ASUS Hack: Operation ShadowHammer
It was revealed last week that a group of state-sponsored hackers managed to hijack ASUS Live automatic software update server last year and pushed malicious updates to over one million Windows computers worldwide in order to infect them with backdoors.

Though the second stage malware was only pushed to nearly 600 targeted users, it doesn&#039;t mean that millions of ASUS computers which received the malicious software update are not compromised]]></description>
		<content:encoded><![CDATA[<p>Here&#8217;s the List of ~600 MAC Addresses Targeted in Recent ASUS Hack<br />
<a href="https://thehackernews.com/2019/03/asus-hack-mac-addresses.html?m=1" rel="nofollow">https://thehackernews.com/2019/03/asus-hack-mac-addresses.html?m=1</a></p>
<p>Russian security firm Kaspersky last week didn&#8217;t release the full list all MAC addresses that hackers hardcoded into their malware to surgically target a specific pool of users.</p>
<p>offline tool and launched an online web page where ASUS PC users can search for their MAC addresses to check whether they were in the hit list.</p>
<p>ASUS Hack: Operation ShadowHammer<br />
It was revealed last week that a group of state-sponsored hackers managed to hijack ASUS Live automatic software update server last year and pushed malicious updates to over one million Windows computers worldwide in order to infect them with backdoors.</p>
<p>Though the second stage malware was only pushed to nearly 600 targeted users, it doesn&#8217;t mean that millions of ASUS computers which received the malicious software update are not compromised</p>
]]></content:encoded>
	</item>
</channel>
</rss>
