Kevin Wharram

50,384 Flips | 12 Magazines | 11 Likes | 6 Following | 11,400 Followers | @ir0nf1re | Keep up with Kevin Wharram on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Kevin Wharram”

The FBI wants you to reboot your router NOW to help destroy a botnet

DO IT NOWWWWW<p>Remember when the world discovered that <i>over half a million routers</i> have been infected with sophisticated "VPNFilter" malware that could, among other things, cut off access to the internet or be used for Russian spying?<p>Today, the FBI is asking everyone -- yes, <i>everyone --</i> to reboot their …

Routers

Goldman Sachs Introduces Their Own Cryptocurrency

“A price-stable currency, such as a token pegged to the US dollar, is critical for enabling mainstream adoption of blockchain technology for payments …

Cryptocurrency

Orlando confirms it's testing Amazon's facial recognition in public

After the ACLU discovered that Orlando's cops are using Amazon's controversial Rekognition facial detection system, police chief John Mina said they're only testing the software at their headquarters. Now, Mina has admitted at a news conference that three of the city's IRIS cameras downtown are …

Surveillance

FBI seeks to thwart cyber-attack on Ukraine

<b>Preparations for a cyber-attack on Ukraine have been thwarted by the FBI.</b><p>It seized a website that was helping communicate with home routers infected with malware that would carry out the digital bombardment.<p>More than 500,000 routers in 54 countries had been infected by the "dangerous" malware and …

Cybersecurity

Russia hacks THOUSANDS of devices with researchers warning 'MAJOR CYBERATTACKS' expected

GETTYRussian hackers have infected at least 500,000 devices with malicious malware<p>Researchers at Cisco Talos said they had “high confidence” the …

Cybersecurity

New US Bill Wants to Create National Guard Cyber Units

US lawmakers have proposed a bill that would create specialized units in the National Guard for defending and responding to cyber-attacks.<p>According …

National Guard

Tasmania's hospital computer systems vulnerable to cyber attack, report says

Tasmania's Health and Human Services Department is at "excessive risk of cyber attack", according to a report by the Auditor-General.<p>The …

Cybersecurity

Nation-State Group Hacked 500,000 Routers to Prepare a Cyber-Attack on Ukraine

Security researchers from Cisco said today that they've detected a giant botnet of hacked routers that appears to be preparing for a cyber-attack on …

Cybersecurity

Was A Massive Cyberattack Just Prevented?

Share Email<p>The Federal Bureau of Investigation (FBI) is dismantling a “large network of hacked routers and storage devices” that could have enabled a …

Cybersecurity

Bitcoin and Ethereum Price Manipulation: The DOJ Investigation, Explained

The Justice Department is cracking down.<p>The United States Department of Justice has launched a private investigation into price manipulation in the …

Cryptocurrency

John MacAfee: EOS will Hit $32 by end of July 2018: IOTA, Tron, EOS, Litecoin and Stellar Lumens Price Analysis (May 25, 2018)

Because of today’s Tron Virtual Machine launch, traders should to capitalize on positive vibes around this event and Tron prospects in general. We …

Cryptocurrency

New Strain of Malware Hijacks Apple Macs to Mine Monero

A new type of malicious software infecting Apple's Macs is mining monero, researchers with cybersecurity firm Malwarebytes announced.<p>In a blog post …

Cybersecurity

The DC Cybersecurity Think Tank Caught Using Fake Twitter Accounts Has Lost Sponsors, And Its Shady Cofounder Is Gone

Following a BuzzFeed News investigation, Institute for Critical Infrastructure Technology cofounder James Scott has “voluntarily decided to step away” and a law firm will review claims about him.<p>A Washington think tank that used fake Twitter and YouTube accounts to amplify its content, and whose …

Internet

What Will GDPR's Impact Be On U.S. Consumer Privacy?

Will General Data Protection Regulation rules that go in effect on Friday impact the privacy of U.S. citizens? It depends who you ask, but the …

Privacy

Electron Windows Protocol Handler MITM/RCE (bypass for CVE-2018-1000006 fix)

24 May 2018 - Posted by Luca Carettoni<p>As part of an engagement for one of our clients, we analyzed the patch for the recent Electron Windows Protocol …

Information Security

Multitor - A Tool That Lets You Create Multiple TOR Instances With A Load-Balancing

A tool that lets you <b>create multiple TOR</b> instances with a <b>load-balancing</b> traffic between them by <b>HAProxy</b>. It's provides one single endpoint for clients. …

Linux

FBI seizes VPNFilter botnet domain that infected 500,000 routers

<b>It is believed that the botnet was run by infamous Russian hacking group Fancy Bear.</b><p>The Federal Bureau of Investigation (FBI) has seized a domain …

Malicious Edge and Chrome Extension Used to Deliver Backdoor

<b>by Jaromir Horejsi, Joseph C. Chen, and Loseway Lu</b><p>We noticed a series of testing submissions in VirusTotal that apparently came from the same group …

Cybersecurity

Binary Exploitation ELI5 — Part 3

<b>“To err is human… to really foul up requires the root password.”</b><p>0x00-Preface<p>This article is part 3 of the <i>Binary Exploitation ELI5</i> article series. For …

Cybersecurity

Virtualization Internals Part 2 - VMWare and Virtualization using Binary Translation

In the previous chapter, we have introduced some basic concepts about hypervisors and briefly touched upon the different techniques to virtualize …

Linux

CVE-2018-5175: Universal CSP strict-dynamic bypass in Firefox

In this blogpost, I'd like to write about a CSP strict-dynamic bypass vulnerability which is fixed in Firefox …

JavaScript

VPNFilter EXIF to C2 mechanism analysed

On May 23 2018, our colleagues from Cisco Talos published their excellent analysis of VPNFilter, an IoT / router malware which exhibits some worrying …

Information Security

Record $152 Million Lawsuit Ensnares Blockchain Project Augur

Three years ago, Augur, a prediction market system that runs on the ethereum blockchain, held one of the first initial coin offerings (ICOs), long …

Blockchain

EU's new data protection rules come into effect

The European Union's new data protection laws came into effect on Friday, with Brussels saying the changes will protect consumers from being like …

GDPR

China is exporting facial recognition software to Africa, expanding its vast database

For all the promise it holds for the future, artificial intelligence is still guilty of historic bias. Voice recognition software struggles with English accents that are not American or British and facial recognition can be guilty of racial profiling.<p>As this technology increasingly outpaces human …

Artificial Intelligence

Fox hosts amplify Trump’s ‘Spygate’ line

An unsubstantiated allegation, tweeted incessantly by the president, has become ‘maybe the greatest scandal in modern political history,’ according to network hosts.<p>The feedback loop between President Donald Trump and Fox News hosts has gone into overdrive in the last week, with the president and …

Donald Trump

An Amazon Echo Shared A Woman's Private Conversation As A Voice Message

Amazon says the Echo mistakenly heard the "Alexa" wake word, in addition to multiple confirmation prompts.<p>A Portland, Oregon, woman said she feels like Amazon Echo invaded her family's privacy after the voice-controlled device sent audio recordings of her private conversation to one of her …

Smart Homes

Bitcoin Gold loses millions as it is hit by a double spend attack

The attack occurred last week, which saw <b>a malicious miner acquire temporary control of the Bitcoin Gold network’s total hash power</b>, reports CCN. That gave the miner control of Bitcoin Gold’s blockchain. During the time the hacker controlled the blockchain, they may have transferred up to $18.6 …

Bitcoin

Amazon confirms that Echo device secretly shared user’s private audio [Updated]

The call that started it all: "Unplug your Alexa devices right now."<p>Amazon confirmed an Echo owner's privacy-sensitive allegation on Thursday, after …

Customer Service

Persistence using GlobalFlags in Image File Execution Options – Hidden from Autoruns.exe

<b>TL;DR</b><br>– Found a technique to execute any binary file after another application is closed without being detected by Autoruns.exe.<br>– Requires …