New Hack: How to Bypass iPhone Passcode to Access Photos and Messages
- - - Beitrag zusammengeführt - - -
Pre-installed Backdoor On 700 Million Android Phones Sending Users' Data To China
- - - Beitrag zusammengeführt - - -
This Hack Gives Linux Root Shell Just By Pressing 'ENTER' for 70 Seconds
Kompletter Artikel: The Hacker News - New Hack: How to Bypass iPhone Passcode to Access Photos and MessagesSetting a passcode on your iPhone is the first line of defense to help prevent other people from accessing your personal details.
However, it's pretty much easy for anyone with access to your iPhone to bypass the passcode protection (doesn't matter if you configured Touch ID or not) and access your personal photos and messages.
A new critical security flaw discovered in iOS 8 and newer, including 10.2 beta 3, allows anyone to bypass iPhone's passcode and gain access to personal information using the benevolent nature of Apple's personal assistant Siri.
- - - Beitrag zusammengeführt - - -
Pre-installed Backdoor On 700 Million Android Phones Sending Users' Data To China
Kompletter Artikel: The Hacker News - Pre-installed Backdoor On 700 Million Android Phones Sending Users' Data To ChinaDo you own an Android smartphone? You could be one of those 700 Million users whose phone is secretly sending text messages to China every 72 hours.
You heard that right. Over 700 Million Android smartphones contain a secret 'backdoor' that surreptitiously sends all your text messages, call log, contact list, location history, and app data to China every 72 hours.
Security researchers from Kryptowire discovered the alleged backdoor hidden in the firmware of many budget Android smartphones sold in the United States, which covertly gathers data on phone owners and sends it to a Chinese server without users knowing.
- - - Beitrag zusammengeführt - - -
This Hack Gives Linux Root Shell Just By Pressing 'ENTER' for 70 Seconds
Kompletter Artikel: The Hacker News - This Hack Gives Linux Root Shell Just By Pressing 'ENTER' for 70 SecondsA hacker with little more than a minute can bypass the authentication procedures on some Linux systems just by holding down the Enter key for around 70 seconds.
The result? The act grants the hacker a shell with root privileges, which allows them to gain complete remote control over encrypted Linux machine.
The security issue relies due to a vulnerability (CVE-2016-4484) in the implementation of the Cryptsetup utility used for encrypting hard drives via Linux Unified Key Setup (LUKS), which is the standard implementation of disk encryption on a Linux-based operating system.