Author: DEFENDEDGE

  • Social Engineering

    Social Engineering How to Stop Social Engineering, Phishing Attacks, and Identity Theft​ What is social engineering? In a social engineering scenario, the attacker (bad actor) uses human interaction through social media, email, or some other form of communications to obtain targeted information. These bad actors typically claim to be a new employee, repair person, or… Read more

  • How to Update Your Remote Access Policy

    Reducing the risks of remote work starts with updating the access policies of yesterday. Read more

  • Critical MobileIron RCE Flaw Under Active Attack

    Attackers are targeting the critical remote code-execution flaw to compromise systems in the healthcare, local government, logistics and legal sectors, among others. Read more

  • Light-Based Attacks Expand in the Digital Home

    The team that hacked Amazon Echo and other smart speakers using a laser pointer continue to investigate why MEMS microphones respond to sound. Read more

  • Baidu Apps in Google Play Leak Sensitive Data

    Cyberattackers could use the information to track users across devices, disable phone service, or intercept messages and phone calls. Read more

  • Online Holiday Shopping Scams

    Original release date: November 24, 2020 With more commerce occurring online this year, and with the holiday season upon us, the Cybersecurity and Infrastructure Security Agency (CISA) reminds shoppers to remain vigilant. Be especially cautious of fraudulent sites spoofing reputable businesses, unsolicited emails purporting to be from charities, and unencrypted financial transactions. CISA encourages online… Read more

  • Tesla Hacked and Stolen Again Using Key Fob

    Belgian researchers demonstrate third attack on the car manufacturer’s keyless entry system, this time to break into a Model X within minutes. Read more

  • Critical VMware Zero-Day Bug Allows Command Injection; Patch Pending

    VMware explained it has no patch for a critical escalation-of-privileges bug that impacts both Windows and Linux operating systems and its Workspace One. Read more

  • GoDaddy Employees Tricked into Compromising Cryptocurrency Sites

    ‘Vishing’ attack on GoDaddy employees gave fraudsters access to cryptocurrency service domains NiceHash, Liquid. Read more

  • VMware Releases Workarounds for CVE-2020-4006

    Original release date: November 23, 2020 VMware has released workarounds to address a vulnerability—CVE-2020-4006—in VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector. An attacker could exploit this vulnerability to take control of an affected system. The Cybersecurity and Infrastructure Security Agency encourages users and administrators to review VMware Security Advisory VMSA-2020-0027… Read more