Forwarded from BlackBox (Security) Archiv
FBI warns about snoopy smart TVs spying on you
An FBI branch office warns smart TV users that they can be gateways for hackers to come into your home. Meanwhile, the smart TV OEMs are already spying on you
A recent #FBI #report warned #smart #TV users that #hackers can also take control of your unsecured TV. "At the low end of the risk spectrum, they can change channels, play with the volume, and show your kids inappropriate videos. In a worst-case scenario, they can turn on your bedroom TV's camera and microphone and silently #cyberstalk you," explained the FBI.
The risk isn't new. A few years ago, smart TVs from #LG, #Samsung, and #Vizio were #spying and #reporting on your viewing habits to their #manufacturers.
Today, the FBI is warning that "TV manufacturers and #app #developers may be listening and watching you." It added, "[A] television can also be a gateway for hackers to come into your home. A bad cyber actor may not be able to access your locked-down computer directly, but it is possible that your unsecured TV can give him or her an easy way in the #backdoor through your #router."
That's true, but while there have been relatively few cases of hackers invading homes via their smart TVs, it's only a matter of time until they're watching and listening to you.
ππΌ Read more:
https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
An FBI branch office warns smart TV users that they can be gateways for hackers to come into your home. Meanwhile, the smart TV OEMs are already spying on you
A recent #FBI #report warned #smart #TV users that #hackers can also take control of your unsecured TV. "At the low end of the risk spectrum, they can change channels, play with the volume, and show your kids inappropriate videos. In a worst-case scenario, they can turn on your bedroom TV's camera and microphone and silently #cyberstalk you," explained the FBI.
The risk isn't new. A few years ago, smart TVs from #LG, #Samsung, and #Vizio were #spying and #reporting on your viewing habits to their #manufacturers.
Today, the FBI is warning that "TV manufacturers and #app #developers may be listening and watching you." It added, "[A] television can also be a gateway for hackers to come into your home. A bad cyber actor may not be able to access your locked-down computer directly, but it is possible that your unsecured TV can give him or her an easy way in the #backdoor through your #router."
That's true, but while there have been relatively few cases of hackers invading homes via their smart TVs, it's only a matter of time until they're watching and listening to you.
ππΌ Read more:
https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
Forwarded from BlackBox (Security) Archiv
Ransomware gang publishes tens of GBs of internal data from LG and Xerox
Maze gang publishes internal data from LG and Xerox after failed extortion attempt.
The operators of the Maze ransomware have published today tens of GB of internal data from the networks of enterprise business giants LG and Xerox following two failed extortion attempts.
The hackers leaked 50.2 GB they claim to have stolen from LG's internal network, and 25.8 GB of Xerox data.
While LG issued a generic statement to ZDNet in June, neither company wanted to talk about the incident in great depth today.
Both of today's leaks have been teased since late June when the operators of the Maze ransomware created entries for each of the two companies on their "leak portal."
The Maze gang is primarily known for its eponymous ransomware string and usually operates by breaching corporate networks, stealing sensitive files first, encrypting data second, and demanding a ransom to decrypt files.
If a victim refuses to pay the fee to decrypt their files and decides to restore from backups, the Maze gang creates an entry on a "leak website" and threatens to publish the victim's sensitive data in a second form ransom/extortion attempt.
The victim is then given a few weeks to think over its decision, and if victims don't give in during this second extortion attempt, the Maze gang will publish files on its portal.
LG and Xerox are at this last stage, after apparently refusing to meet the Maze gang's demands.
π ππΌ https://www.zdnet.com/article/ransomware-gang-publishes-tens-of-gbs-of-internal-data-from-lg-and-xerox/
π ππΌ π©πͺ https://www.golem.de/news/datenleck-ransomwaregruppe-veroeffentlicht-daten-von-lg-und-xerox-2008-150044.html
#maze #ransomware #lg #xerox #extortion
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Maze gang publishes internal data from LG and Xerox after failed extortion attempt.
The operators of the Maze ransomware have published today tens of GB of internal data from the networks of enterprise business giants LG and Xerox following two failed extortion attempts.
The hackers leaked 50.2 GB they claim to have stolen from LG's internal network, and 25.8 GB of Xerox data.
While LG issued a generic statement to ZDNet in June, neither company wanted to talk about the incident in great depth today.
Both of today's leaks have been teased since late June when the operators of the Maze ransomware created entries for each of the two companies on their "leak portal."
The Maze gang is primarily known for its eponymous ransomware string and usually operates by breaching corporate networks, stealing sensitive files first, encrypting data second, and demanding a ransom to decrypt files.
If a victim refuses to pay the fee to decrypt their files and decides to restore from backups, the Maze gang creates an entry on a "leak website" and threatens to publish the victim's sensitive data in a second form ransom/extortion attempt.
The victim is then given a few weeks to think over its decision, and if victims don't give in during this second extortion attempt, the Maze gang will publish files on its portal.
LG and Xerox are at this last stage, after apparently refusing to meet the Maze gang's demands.
π ππΌ https://www.zdnet.com/article/ransomware-gang-publishes-tens-of-gbs-of-internal-data-from-lg-and-xerox/
π ππΌ π©πͺ https://www.golem.de/news/datenleck-ransomwaregruppe-veroeffentlicht-daten-von-lg-und-xerox-2008-150044.html
#maze #ransomware #lg #xerox #extortion
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
ZDNET
Ransomware gang publishes tens of GBs of internal data from LG and Xerox
Maze gang publishes internal data from LG and Xerox after failed extortion attempt.
LG made the difficult decision to close its mobile phone business
Dear developers,
We would like to express our sincere gratitude to all developers who visit the LG Mobile Developer website.
LG made the difficult decision to close its mobile phone business to focus on other businesses that will provide new experiences and value for consumers. Hereby, we inform you that the service of #LG Mobile Developer is scheduled to terminate on December 31st, 2021.
https://developer.lge.com/main/RetrieveNoticePop.dev?nticId=NOT00005060&width=675
Dear developers,
We would like to express our sincere gratitude to all developers who visit the LG Mobile Developer website.
LG made the difficult decision to close its mobile phone business to focus on other businesses that will provide new experiences and value for consumers. Hereby, we inform you that the service of #LG Mobile Developer is scheduled to terminate on December 31st, 2021.
https://developer.lge.com/main/RetrieveNoticePop.dev?nticId=NOT00005060&width=675
DevMode Manager for webOS #LG #TV
Simple tool to manage "developer mode enabled" or rooted webOS TV
Features
No need to install LG SDK or IDE
Add device without need to use command line
Install apps on TV with a few clicks
Configuration compatible with ares-cli
Works on Windows, Linux and macOS (Apple Silicon too!)
Dark mode follows system preferences
https://github.com/webosbrew/dev-manager-desktop
Download
https://github.com/webosbrew/dev-manager-desktop/releases
Extra: How to install Kodi
https://kodi.wiki/view/HOW-TO:Install_Kodi_for_webOS
Simple tool to manage "developer mode enabled" or rooted webOS TV
Features
No need to install LG SDK or IDE
Add device without need to use command line
Install apps on TV with a few clicks
Configuration compatible with ares-cli
Works on Windows, Linux and macOS (Apple Silicon too!)
Dark mode follows system preferences
https://github.com/webosbrew/dev-manager-desktop
Download
https://github.com/webosbrew/dev-manager-desktop/releases
Extra: How to install Kodi
https://kodi.wiki/view/HOW-TO:Install_Kodi_for_webOS
GitHub
GitHub - webosbrew/dev-manager-desktop: Device/DevMode Manager for webOS TV
Device/DevMode Manager for webOS TV. Contribute to webosbrew/dev-manager-desktop development by creating an account on GitHub.