Backdoor

Video: Seagate wireless drives at risk from dumb password backdoor

Bad luck if you have one of the vulnerable Seagate wireless drives.

An undocumented backdoor allows malicious hackers to access files, just by using the username “root” with the password of “root”.

Grab the fix if you’re affected.


24 sec read

Another tech firm says it has quit the UK over government internet surveillance plans

Eris Industries says it simply cannot engage in business if it is forced to incorporate cryptographic backdoors that can be accessed by MI5 and GCHQ.


2 min read

Technology firm says it is quitting the UK because of government internet surveillance plans

The first of many?

The UK government’s plans for a Snooper’s Charter and backdoors on secure messaging applications don’t prove popular with one technology company.


1 min read

Obama: “China, don’t you dare make us put backdoors in our software!” (That’s our job…)

China and the United States are at loggerheads over Beijing’s plan to force technology companies to share their encryption keys, and put backdoors into their software, if they wish to sell into China.

After all, that would never be proposed by a Western government, would it..?


2 min read

Listen to this BBC radio punch-up over David Cameron’s surveillance backdoor

Earlier this week, I appeared on BBC Radio Five to discuss David Cameron’s plans to snoop on secure messaging services.

It became a rather “heated discussion” with someone who advises the government on national security issues. Listen for yourself.


1 min read

intego.com

Hacker claims to have found undocumented iOS “backdoor”; Apple denies NSA collusion

A data forensics expert and jailbreaker has discovered what he claims to be a undocumented “backdoor” in the iOS operating system used on iPhones and iPads that could be exploited by the NSA and other law enforcement agencies.

Read more in my article on the Intego Mac Security blog.


0 sec read

Python-based malware attack targets Macs. Windows PCs also under fire

A new malware attack is targeting Mac computers with a Python-based backdoor Trojan.

And Windows computers aren’t getting away scot free either.


6 sec read

Mac backdoor Trojan embedded inside boobytrapped Word documents

A backdoor Trojan horse, which would allow a remote hacker to access your Mac computer without your knowledge and potentially snoop on your files and activity, has been discovered hidden inside a boobytrapped Word document.


9 sec read

Mac malware: Tsunami backdoor variants discovered

New variants of the latest Mac malware – the Tsunami backdoor Trojan – have been discovered.

The sky is not falling, and Mac users should not panic. But it may still be prudent to ensure your computers are protected against this and other Mac threats.


11 sec read

Mac malware evolves – time for Apple users to wake up

Mac users have once again been reminded not to be complacent about the malware threat, with the discovery that cybercriminals have enhanced an existing Trojan horse to disable the rudimentary anti-virus protection Apple has built into Mac OS X.


10 sec read

German ‘Government’ R2D2 Trojan FAQ

Was the R2D2 Trojan used by German law enforcement agencies to spy on citizens?

Read our FAQ, and learn more about this unfolding case.


7 sec read

‘Government’ backdoor R2D2 Trojan discovered by Chaos Computer Club

A Trojan horse allegedly created by the German government to spy on citizens’ online activity and Skype conversations has been discovered.

Sit back, eat your popcorn, and get ready for the political storm if this proves to be true.


10 sec read

Flashback Mac Trojan poses as Adobe Flash update, opens backdoor

Mac users are once again being reminded to keep their anti-virus software up-to-date, following the discovery of a Trojan horse that poses as an update to Adobe Flash.


7 sec read

Death by PowerPoint? Kama Sutra presentation leads to backdoor infection

Would you be interested in a PowerPoint presentation demonstrating different sexual positions from the Kama Sutra?

Watch what you do with your mouse – you could be leading to a malware infection.


8 sec read

Hacked iPhones held hostage for 5 Euros

Read more in my article at Naked Security.


1 sec read