<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news in July 2019</title>
	<atom:link href="http://www.epanorama.net/blog/2019/07/01/cyber-security-news-in-july-2019/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2019/07/01/cyber-security-news-in-july-2019/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Mon, 20 Apr 2026 08:16:11 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/07/01/cyber-security-news-in-july-2019/comment-page-5/#comment-1646814</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Aug 2019 05:25:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182924#comment-1646814</guid>
		<description><![CDATA[Cyberattack On LAPD Confirmed: Data Breach Impacts Thousands Of Officers
https://www.forbes.com/sites/zakdoffman/2019/07/30/lapd-cyberattack-police-department-confirms-it-has-been-hacked/#155677aa14be

The Los Angeles Police Department has confirmed that it has been hacked, with the personal information of at least 20,000 people exposed.]]></description>
		<content:encoded><![CDATA[<p>Cyberattack On LAPD Confirmed: Data Breach Impacts Thousands Of Officers<br />
<a href="https://www.forbes.com/sites/zakdoffman/2019/07/30/lapd-cyberattack-police-department-confirms-it-has-been-hacked/#155677aa14be" rel="nofollow">https://www.forbes.com/sites/zakdoffman/2019/07/30/lapd-cyberattack-police-department-confirms-it-has-been-hacked/#155677aa14be</a></p>
<p>The Los Angeles Police Department has confirmed that it has been hacked, with the personal information of at least 20,000 people exposed.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/07/01/cyber-security-news-in-july-2019/comment-page-5/#comment-1646810</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Aug 2019 04:22:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182924#comment-1646810</guid>
		<description><![CDATA[New Research: Investigating and Reversing Avionics CAN Bus Systems
https://blog.rapid7.com/2019/07/30/new-research-investigating-and-reversing-avionics-can-bus-systems/

This paper examines the security (or lack thereof) in CAN bus networks, specifically as they are implemented in small aircraft.

CAN bus for aviation. After all, it&#039;s inexpensive, easy to connect (just two wires), EMI-resistant, and it&#039;s rapidly becoming the de-facto standard network that connects electronically controlled sensors and actuators in all sorts of vehicles, aircraft included

How secure are CAN bus avionics systems?
Unfortunately, it looks like the avionics sector is lagging in network security when it comes to CAN bus, and I think part of the reason is the heavy reliance on the physical security of airplanes. 


Think about it: If you felt like your internal LAN was totally and completely untouchable by attackers, you probably wouldn&#039;t worry much about software patching or password management. Of course, LANs aren&#039;t impregnable, and neither are CAN bus networks, so we&#039;re worried about this mindset when it comes to avionics security.

the security implications of deploying CAN bus have been much discussed in the automotive industry

https://www.rapid7.com/research/report/investigating-can-bus-network-integrity-in-avionics-systems/]]></description>
		<content:encoded><![CDATA[<p>New Research: Investigating and Reversing Avionics CAN Bus Systems<br />
<a href="https://blog.rapid7.com/2019/07/30/new-research-investigating-and-reversing-avionics-can-bus-systems/" rel="nofollow">https://blog.rapid7.com/2019/07/30/new-research-investigating-and-reversing-avionics-can-bus-systems/</a></p>
<p>This paper examines the security (or lack thereof) in CAN bus networks, specifically as they are implemented in small aircraft.</p>
<p>CAN bus for aviation. After all, it&#8217;s inexpensive, easy to connect (just two wires), EMI-resistant, and it&#8217;s rapidly becoming the de-facto standard network that connects electronically controlled sensors and actuators in all sorts of vehicles, aircraft included</p>
<p>How secure are CAN bus avionics systems?<br />
Unfortunately, it looks like the avionics sector is lagging in network security when it comes to CAN bus, and I think part of the reason is the heavy reliance on the physical security of airplanes. </p>
<p>Think about it: If you felt like your internal LAN was totally and completely untouchable by attackers, you probably wouldn&#8217;t worry much about software patching or password management. Of course, LANs aren&#8217;t impregnable, and neither are CAN bus networks, so we&#8217;re worried about this mindset when it comes to avionics security.</p>
<p>the security implications of deploying CAN bus have been much discussed in the automotive industry</p>
<p><a href="https://www.rapid7.com/research/report/investigating-can-bus-network-integrity-in-avionics-systems/" rel="nofollow">https://www.rapid7.com/research/report/investigating-can-bus-network-integrity-in-avionics-systems/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/07/01/cyber-security-news-in-july-2019/comment-page-5/#comment-1646778</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Jul 2019 19:25:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182924#comment-1646778</guid>
		<description><![CDATA[DOD workers bought thousands of Chinese electronics vulnerable to hacks, spying
https://www.rollcall.com/news/policy/pentagon-dod-workers-bought-thousands-of-hackable-chinese-electronics-spy


More than 9,000 commercially available products could be used to spy on or hack U.S. military personnel and facilities]]></description>
		<content:encoded><![CDATA[<p>DOD workers bought thousands of Chinese electronics vulnerable to hacks, spying<br />
<a href="https://www.rollcall.com/news/policy/pentagon-dod-workers-bought-thousands-of-hackable-chinese-electronics-spy" rel="nofollow">https://www.rollcall.com/news/policy/pentagon-dod-workers-bought-thousands-of-hackable-chinese-electronics-spy</a></p>
<p>More than 9,000 commercially available products could be used to spy on or hack U.S. military personnel and facilities</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/07/01/cyber-security-news-in-july-2019/comment-page-5/#comment-1646775</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Jul 2019 19:14:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182924#comment-1646775</guid>
		<description><![CDATA[&#039;Our task was to set Americans against their own government&#039;: New details emerge about Russia&#039;s trolling operation
https://www.businessinsider.com/former-troll-russia-disinformation-campaign-trump-2017-10?fbclid=IwAR27qpOE9jPKoqj7yimXXIqG9Vn-mkP36u__8aaGGhI-5Gz5PedvEpO6gcw&amp;utm_medium=referral&amp;utm_content=topbar&amp;utm_term=desktop&amp;referrer=facebook&amp;r=US&amp;IR=T

The Russian desk operated bots and trolls that used fake social-media accounts to flood the internet with pro-Trump messages and made-up news.
The foreign desk was more sophisticated, with trolls required to learn the nuances of American politics to best &quot;rock the boat&quot; on divisive issues.

&quot;Our task was to set Americans against their own government,&quot; Maxim said, &quot;to provoke unrest and discontent.&quot;]]></description>
		<content:encoded><![CDATA[<p>&#8216;Our task was to set Americans against their own government&#8217;: New details emerge about Russia&#8217;s trolling operation<br />
<a href="https://www.businessinsider.com/former-troll-russia-disinformation-campaign-trump-2017-10?fbclid=IwAR27qpOE9jPKoqj7yimXXIqG9Vn-mkP36u__8aaGGhI-5Gz5PedvEpO6gcw&#038;utm_medium=referral&#038;utm_content=topbar&#038;utm_term=desktop&#038;referrer=facebook&#038;r=US&#038;IR=T" rel="nofollow">https://www.businessinsider.com/former-troll-russia-disinformation-campaign-trump-2017-10?fbclid=IwAR27qpOE9jPKoqj7yimXXIqG9Vn-mkP36u__8aaGGhI-5Gz5PedvEpO6gcw&#038;utm_medium=referral&#038;utm_content=topbar&#038;utm_term=desktop&#038;referrer=facebook&#038;r=US&#038;IR=T</a></p>
<p>The Russian desk operated bots and trolls that used fake social-media accounts to flood the internet with pro-Trump messages and made-up news.<br />
The foreign desk was more sophisticated, with trolls required to learn the nuances of American politics to best &#8220;rock the boat&#8221; on divisive issues.</p>
<p>&#8220;Our task was to set Americans against their own government,&#8221; Maxim said, &#8220;to provoke unrest and discontent.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/07/01/cyber-security-news-in-july-2019/comment-page-5/#comment-1646774</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Jul 2019 19:11:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182924#comment-1646774</guid>
		<description><![CDATA[The hacker who cracked into Capital One—gaining access to more than 100 million credit cards—may have unleashed havoc on many more companies. 

http://on.forbes.com/6186ELXpg]]></description>
		<content:encoded><![CDATA[<p>The hacker who cracked into Capital One—gaining access to more than 100 million credit cards—may have unleashed havoc on many more companies. </p>
<p><a href="http://on.forbes.com/6186ELXpg" rel="nofollow">http://on.forbes.com/6186ELXpg</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/07/01/cyber-security-news-in-july-2019/comment-page-5/#comment-1646757</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Jul 2019 16:14:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182924#comment-1646757</guid>
		<description><![CDATA[US warns small planes are vulnerable to hacking
https://nypost.com/2019/07/31/us-warns-small-planes-are-vulnerable-to-hacking/?utm_campaign=iosapp&amp;utm_source=facebook_app


The Department of Homeland Security issued a security alert Tuesday for small planes, warning that modern flight systems are vulnerable to hacking if someone manages to gain physical access to the aircraft.

The cybersecurity firm, Rapid7, found that an attacker could potentially disrupt electronic messages transmitted across a small plane’s network, for example by attaching a small device to its wiring, that would affect aircraft systems.

Engine readings, compass data, altitude and other readings “could all be manipulated to provide false measurements to the pilot,” according to the DHS alert.

The warning reflects the fact that aircraft systems are increasingly reliant on networked communications systems, much like modern cars. The auto industry has already taken steps to address similar concerns after researchers exposed vulnerabilities.]]></description>
		<content:encoded><![CDATA[<p>US warns small planes are vulnerable to hacking<br />
<a href="https://nypost.com/2019/07/31/us-warns-small-planes-are-vulnerable-to-hacking/?utm_campaign=iosapp&#038;utm_source=facebook_app" rel="nofollow">https://nypost.com/2019/07/31/us-warns-small-planes-are-vulnerable-to-hacking/?utm_campaign=iosapp&#038;utm_source=facebook_app</a></p>
<p>The Department of Homeland Security issued a security alert Tuesday for small planes, warning that modern flight systems are vulnerable to hacking if someone manages to gain physical access to the aircraft.</p>
<p>The cybersecurity firm, Rapid7, found that an attacker could potentially disrupt electronic messages transmitted across a small plane’s network, for example by attaching a small device to its wiring, that would affect aircraft systems.</p>
<p>Engine readings, compass data, altitude and other readings “could all be manipulated to provide false measurements to the pilot,” according to the DHS alert.</p>
<p>The warning reflects the fact that aircraft systems are increasingly reliant on networked communications systems, much like modern cars. The auto industry has already taken steps to address similar concerns after researchers exposed vulnerabilities.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/07/01/cyber-security-news-in-july-2019/comment-page-5/#comment-1646756</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Jul 2019 15:46:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182924#comment-1646756</guid>
		<description><![CDATA[To Spot MDMA Users, Festivals May Soon Roll Out Thermal Cameras
https://merryjane.com/news/to-spot-mdma-users-festivals-may-soon-roll-out-thermal-cameras

Festival organizers claim that thermal cameras may help them find MDMA users who are dangerously overheating, but surveillance in the name of safety is often used against us]]></description>
		<content:encoded><![CDATA[<p>To Spot MDMA Users, Festivals May Soon Roll Out Thermal Cameras<br />
<a href="https://merryjane.com/news/to-spot-mdma-users-festivals-may-soon-roll-out-thermal-cameras" rel="nofollow">https://merryjane.com/news/to-spot-mdma-users-festivals-may-soon-roll-out-thermal-cameras</a></p>
<p>Festival organizers claim that thermal cameras may help them find MDMA users who are dangerously overheating, but surveillance in the name of safety is often used against us</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/07/01/cyber-security-news-in-july-2019/comment-page-5/#comment-1646754</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Jul 2019 15:32:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182924#comment-1646754</guid>
		<description><![CDATA[Update to iOS 12.4 right away
https://www.kaspersky.com/blog/ios-critical-vulnerabilities-124/27778/

Updating your iPhone’s or iPad’s operating system as soon as the new version comes out is always a good idea — almost every new version of iOS contains fixes for some bugs that have been found in previous ones. But this time it might be even more crucial: iOS 12.4 fixes severe vulnerabilities in iMessage that can be exploited without any user interaction.]]></description>
		<content:encoded><![CDATA[<p>Update to iOS 12.4 right away<br />
<a href="https://www.kaspersky.com/blog/ios-critical-vulnerabilities-124/27778/" rel="nofollow">https://www.kaspersky.com/blog/ios-critical-vulnerabilities-124/27778/</a></p>
<p>Updating your iPhone’s or iPad’s operating system as soon as the new version comes out is always a good idea — almost every new version of iOS contains fixes for some bugs that have been found in previous ones. But this time it might be even more crucial: iOS 12.4 fixes severe vulnerabilities in iMessage that can be exploited without any user interaction.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/07/01/cyber-security-news-in-july-2019/comment-page-5/#comment-1646726</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Jul 2019 06:01:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182924#comment-1646726</guid>
		<description><![CDATA[Kiristäjät vaativat lunnaita Kokemäen kaupungilta – haittaohjelma pisti kaupungin verkon polvilleen
https://yle.fi/uutiset/3-10899982]]></description>
		<content:encoded><![CDATA[<p>Kiristäjät vaativat lunnaita Kokemäen kaupungilta – haittaohjelma pisti kaupungin verkon polvilleen<br />
<a href="https://yle.fi/uutiset/3-10899982" rel="nofollow">https://yle.fi/uutiset/3-10899982</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/07/01/cyber-security-news-in-july-2019/comment-page-5/#comment-1646690</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 30 Jul 2019 19:31:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182924#comment-1646690</guid>
		<description><![CDATA[Exclusive: Hack Breaks Your Visa Card’s Contactless Limit For Big Frauds
https://www.forbes.com/sites/thomasbrewster/2019/07/29/exclusive-hackers-can-break-your-credit-cards-30-contactless-limit/

Think that £30 limit on contactless payments is going to protect you from big thefts? Think again. ]]></description>
		<content:encoded><![CDATA[<p>Exclusive: Hack Breaks Your Visa Card’s Contactless Limit For Big Frauds<br />
<a href="https://www.forbes.com/sites/thomasbrewster/2019/07/29/exclusive-hackers-can-break-your-credit-cards-30-contactless-limit/" rel="nofollow">https://www.forbes.com/sites/thomasbrewster/2019/07/29/exclusive-hackers-can-break-your-credit-cards-30-contactless-limit/</a></p>
<p>Think that £30 limit on contactless payments is going to protect you from big thefts? Think again. </p>
]]></content:encoded>
	</item>
</channel>
</rss>
