<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news September 2019</title>
	<atom:link href="http://www.epanorama.net/blog/2019/09/01/cyber-security-news-september-2019/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2019/09/01/cyber-security-news-september-2019/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 22 Apr 2026 08:40:06 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/09/01/cyber-security-news-september-2019/comment-page-5/#comment-1654265</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 06 Oct 2019 15:30:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183818#comment-1654265</guid>
		<description><![CDATA[https://arstechnica.com/tech-policy/2019/09/feds-seek-to-seize-all-profits-from-snowdens-book-over-nda-violation/]]></description>
		<content:encoded><![CDATA[<p><a href="https://arstechnica.com/tech-policy/2019/09/feds-seek-to-seize-all-profits-from-snowdens-book-over-nda-violation/" rel="nofollow">https://arstechnica.com/tech-policy/2019/09/feds-seek-to-seize-all-profits-from-snowdens-book-over-nda-violation/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/09/01/cyber-security-news-september-2019/comment-page-5/#comment-1654264</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 06 Oct 2019 15:29:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183818#comment-1654264</guid>
		<description><![CDATA[An artificial-intelligence first: Voice-mimicking software reportedly used in a major theft
http://www.impactlab.net/2019/09/17/an-artificial-intelligence-first-voice-mimicking-software-reportedly-used-in-a-major-theft/]]></description>
		<content:encoded><![CDATA[<p>An artificial-intelligence first: Voice-mimicking software reportedly used in a major theft<br />
<a href="http://www.impactlab.net/2019/09/17/an-artificial-intelligence-first-voice-mimicking-software-reportedly-used-in-a-major-theft/" rel="nofollow">http://www.impactlab.net/2019/09/17/an-artificial-intelligence-first-voice-mimicking-software-reportedly-used-in-a-major-theft/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/09/01/cyber-security-news-september-2019/comment-page-5/#comment-1654253</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 06 Oct 2019 15:13:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183818#comment-1654253</guid>
		<description><![CDATA[Hackers target transportation and shipping companies in new trojan malware campaign
Previously unknown malicious tools are being deployed in cyberattacks being conducted by a group researchers have named xHunt - after anime references used in their campaigns.
https://www.zdnet.com/article/hackers-target-transportation-and-shipping-industries-in-new-trojan-malware-campaign/]]></description>
		<content:encoded><![CDATA[<p>Hackers target transportation and shipping companies in new trojan malware campaign<br />
Previously unknown malicious tools are being deployed in cyberattacks being conducted by a group researchers have named xHunt &#8211; after anime references used in their campaigns.<br />
<a href="https://www.zdnet.com/article/hackers-target-transportation-and-shipping-industries-in-new-trojan-malware-campaign/" rel="nofollow">https://www.zdnet.com/article/hackers-target-transportation-and-shipping-industries-in-new-trojan-malware-campaign/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/09/01/cyber-security-news-september-2019/comment-page-5/#comment-1654123</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 05 Oct 2019 19:03:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183818#comment-1654123</guid>
		<description><![CDATA[https://www.forbes.com/sites/zakdoffman/2019/09/24/new-cyberwarfare-report-unveils-russias-secret-weapon-against-us-2020-election/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.forbes.com/sites/zakdoffman/2019/09/24/new-cyberwarfare-report-unveils-russias-secret-weapon-against-us-2020-election/" rel="nofollow">https://www.forbes.com/sites/zakdoffman/2019/09/24/new-cyberwarfare-report-unveils-russias-secret-weapon-against-us-2020-election/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/09/01/cyber-security-news-september-2019/comment-page-5/#comment-1653594</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Oct 2019 05:49:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183818#comment-1653594</guid>
		<description><![CDATA[https://ginnoslab.org/2019/09/21/wibattack-vulnerability-in-wib-sim-browser-can-let-attackers-globally-take-control-of-hundreds-of-millions-of-the-victim-mobile-phones-worldwide-to-make-a-phone-call-send-sms-to-any-phone-numbers/]]></description>
		<content:encoded><![CDATA[<p><a href="https://ginnoslab.org/2019/09/21/wibattack-vulnerability-in-wib-sim-browser-can-let-attackers-globally-take-control-of-hundreds-of-millions-of-the-victim-mobile-phones-worldwide-to-make-a-phone-call-send-sms-to-any-phone-numbers/" rel="nofollow">https://ginnoslab.org/2019/09/21/wibattack-vulnerability-in-wib-sim-browser-can-let-attackers-globally-take-control-of-hundreds-of-millions-of-the-victim-mobile-phones-worldwide-to-make-a-phone-call-send-sms-to-any-phone-numbers/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/09/01/cyber-security-news-september-2019/comment-page-5/#comment-1653572</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Oct 2019 03:52:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183818#comment-1653572</guid>
		<description><![CDATA[Billboards not quite secured...

2 suspects scaled 6-foot fence to put porn on Michigan freeway billboard
https://www.mlive.com/news/2019/09/2-suspects-scaled-6-foot-fence-to-put-porn-on-michigan-freeway-billboard.html?fbclid=IwAR0bMDwKIopIOWd1h1jyDC9sTHh-HWWESoo7LUTSTQn7obfGv8Gh9VtWjU4

AUBURN HILLS, MI - Two hoodie-wearing suspect scaled a 6-foot fence and forced their way into a building housing computer equipment in order to run a pornographic video on a digital billboard along I-75 late Saturday night, police said.]]></description>
		<content:encoded><![CDATA[<p>Billboards not quite secured&#8230;</p>
<p>2 suspects scaled 6-foot fence to put porn on Michigan freeway billboard<br />
<a href="https://www.mlive.com/news/2019/09/2-suspects-scaled-6-foot-fence-to-put-porn-on-michigan-freeway-billboard.html?fbclid=IwAR0bMDwKIopIOWd1h1jyDC9sTHh-HWWESoo7LUTSTQn7obfGv8Gh9VtWjU4" rel="nofollow">https://www.mlive.com/news/2019/09/2-suspects-scaled-6-foot-fence-to-put-porn-on-michigan-freeway-billboard.html?fbclid=IwAR0bMDwKIopIOWd1h1jyDC9sTHh-HWWESoo7LUTSTQn7obfGv8Gh9VtWjU4</a></p>
<p>AUBURN HILLS, MI &#8211; Two hoodie-wearing suspect scaled a 6-foot fence and forced their way into a building housing computer equipment in order to run a pornographic video on a digital billboard along I-75 late Saturday night, police said.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/09/01/cyber-security-news-september-2019/comment-page-5/#comment-1653571</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Oct 2019 03:47:57 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183818#comment-1653571</guid>
		<description><![CDATA[New SIM attacks de-mystified, protection tools now available
https://srlabs.de/bites/sim_attacks_demystified/

SIM cards are at the heart of mobile network security. Vulnerabilities including the 2013 remote applet installation hack [1] and the recent ‘Simjacker’ vulnerability [2] put millions of users at risk.

Key research findings

Around 6% of 800 tested SIM cards in recent years were vulnerable to Simjacker
A second, previously unreported, vulnerability affects an additional 3.5% of SIM cards
The tool SIMtester [3] provides a simple way to check any SIM card for both vulnerabilities (and for a range of other issues reported in 2013 [1])
The SnoopSnitch Android app warns users about binary SMS attacks including Simjacker since 2014. (Attack alerting requires a rooted Android phone with Qualcomm chipset.)
A few Simjacker attacks have been reported since 2016 by the thousands of SnoopSnitch users that actively contribute data (Thank you!)

From our collection of 800 SIM card measurements we could infer:

9.4% of the tested SIMs have the S@T applet installed
A subset of 5.6% are vulnerable to Simjacker, because their protection level was set to zero
10.7% have the WIB applet installed
A subset of 3.5% are vulnerable to a Simjacker-style attack against the WIB applet
In total, 9.1% of tested SIM cards were vulnerable to attacks against either S@T or WIB]]></description>
		<content:encoded><![CDATA[<p>New SIM attacks de-mystified, protection tools now available<br />
<a href="https://srlabs.de/bites/sim_attacks_demystified/" rel="nofollow">https://srlabs.de/bites/sim_attacks_demystified/</a></p>
<p>SIM cards are at the heart of mobile network security. Vulnerabilities including the 2013 remote applet installation hack [1] and the recent ‘Simjacker’ vulnerability [2] put millions of users at risk.</p>
<p>Key research findings</p>
<p>Around 6% of 800 tested SIM cards in recent years were vulnerable to Simjacker<br />
A second, previously unreported, vulnerability affects an additional 3.5% of SIM cards<br />
The tool SIMtester [3] provides a simple way to check any SIM card for both vulnerabilities (and for a range of other issues reported in 2013 [1])<br />
The SnoopSnitch Android app warns users about binary SMS attacks including Simjacker since 2014. (Attack alerting requires a rooted Android phone with Qualcomm chipset.)<br />
A few Simjacker attacks have been reported since 2016 by the thousands of SnoopSnitch users that actively contribute data (Thank you!)</p>
<p>From our collection of 800 SIM card measurements we could infer:</p>
<p>9.4% of the tested SIMs have the S@T applet installed<br />
A subset of 5.6% are vulnerable to Simjacker, because their protection level was set to zero<br />
10.7% have the WIB applet installed<br />
A subset of 3.5% are vulnerable to a Simjacker-style attack against the WIB applet<br />
In total, 9.1% of tested SIM cards were vulnerable to attacks against either S@T or WIB</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/09/01/cyber-security-news-september-2019/comment-page-5/#comment-1653557</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 30 Sep 2019 21:21:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183818#comment-1653557</guid>
		<description><![CDATA[Study shows that majority of second-hand hard drives contain previous owner’s data
https://www.zdnet.com/article/study-shows-that-majority-of-second-hand-hard-drives-contain-previous-owners-data/?ftag=COS-05-10aaa0h&amp;utm_campaign=trueAnthem%3A+Trending+Content&amp;utm_content=5d8a1a9b43e1f20001199095&amp;utm_medium=trueAnthem&amp;utm_source=facebook

The problem isn&#039;t just that disks aren&#039;t being wiped, it&#039;s that they many aren&#039;t being wiped properly.]]></description>
		<content:encoded><![CDATA[<p>Study shows that majority of second-hand hard drives contain previous owner’s data<br />
<a href="https://www.zdnet.com/article/study-shows-that-majority-of-second-hand-hard-drives-contain-previous-owners-data/?ftag=COS-05-10aaa0h&#038;utm_campaign=trueAnthem%3A+Trending+Content&#038;utm_content=5d8a1a9b43e1f20001199095&#038;utm_medium=trueAnthem&#038;utm_source=facebook" rel="nofollow">https://www.zdnet.com/article/study-shows-that-majority-of-second-hand-hard-drives-contain-previous-owners-data/?ftag=COS-05-10aaa0h&#038;utm_campaign=trueAnthem%3A+Trending+Content&#038;utm_content=5d8a1a9b43e1f20001199095&#038;utm_medium=trueAnthem&#038;utm_source=facebook</a></p>
<p>The problem isn&#8217;t just that disks aren&#8217;t being wiped, it&#8217;s that they many aren&#8217;t being wiped properly.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/09/01/cyber-security-news-september-2019/comment-page-5/#comment-1653544</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 30 Sep 2019 17:46:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183818#comment-1653544</guid>
		<description><![CDATA[German Cops Raid “Cyberbunker 2.0,” Arrest 7 in Child Porn, Dark Web Market Sting
https://krebsonsecurity.com/2019/09/german-cops-raid-cyberbunker-2-0-arrest-7-in-child-porn-dark-web-market-sting/

After the fire in 2002, there was never any data or servers stored in the bunker,” in The Netherlands, Blaauw recalled. “For 11 years they told everyone [the hosting servers where] in this ultra-secure bunker, but it was all in Amsterdam, and for 11 years they scammed all their clients.”

 said sometime between 2012 and 2013, Xennt purchased the bunker in Traben-Trarbach, Germany — a much more modern structure that was built in 1997. CyberBunker was reborn, and it began offering many of the same amenities and courted the same customers as CyberBunker 1.0 in The Netherlands.

“They’re known for hosting scammers, fraudsters, pedophiles, phishers, everyone,” Blaauw said. “That’s something they’ve done for ages and they’re known for it.”]]></description>
		<content:encoded><![CDATA[<p>German Cops Raid “Cyberbunker 2.0,” Arrest 7 in Child Porn, Dark Web Market Sting<br />
<a href="https://krebsonsecurity.com/2019/09/german-cops-raid-cyberbunker-2-0-arrest-7-in-child-porn-dark-web-market-sting/" rel="nofollow">https://krebsonsecurity.com/2019/09/german-cops-raid-cyberbunker-2-0-arrest-7-in-child-porn-dark-web-market-sting/</a></p>
<p>After the fire in 2002, there was never any data or servers stored in the bunker,” in The Netherlands, Blaauw recalled. “For 11 years they told everyone [the hosting servers where] in this ultra-secure bunker, but it was all in Amsterdam, and for 11 years they scammed all their clients.”</p>
<p> said sometime between 2012 and 2013, Xennt purchased the bunker in Traben-Trarbach, Germany — a much more modern structure that was built in 1997. CyberBunker was reborn, and it began offering many of the same amenities and courted the same customers as CyberBunker 1.0 in The Netherlands.</p>
<p>“They’re known for hosting scammers, fraudsters, pedophiles, phishers, everyone,” Blaauw said. “That’s something they’ve done for ages and they’re known for it.”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/09/01/cyber-security-news-september-2019/comment-page-5/#comment-1653535</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 30 Sep 2019 16:10:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183818#comment-1653535</guid>
		<description><![CDATA[Drivers see porn playing on digital billboard along Michigan highway
https://bit.ly/2mi8k3h

AUBURN HILLS, MI -- Drivers traveling along northbound I-75 Saturday night were shocked to see a pornographic film playing on one of the digital billboards, according WNME 5.]]></description>
		<content:encoded><![CDATA[<p>Drivers see porn playing on digital billboard along Michigan highway<br />
<a href="https://bit.ly/2mi8k3h" rel="nofollow">https://bit.ly/2mi8k3h</a></p>
<p>AUBURN HILLS, MI &#8212; Drivers traveling along northbound I-75 Saturday night were shocked to see a pornographic film playing on one of the digital billboards, according WNME 5.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
