Skip to main content

Posts

KrØØk: Serious vulnerability affected encryption of billion+ Wi‑Fi devices

KrØØk: Serious vulnerability affected encryption of billion+ Wi‑Fi devices   ESET Research has published its latest white paper, KrØØk – CVE-2019-15126: Serious vulnerability deep inside your Wi-Fi encryption. This blogpost summarizes that white paper, authored by researchers Milo š Čermák, Robert Lipovský and Štefan Svorenčík. For updated information regarding patches by individual vendors, readers can also refer to our  dedicated webpage . ESET researchers discovered a previously unknown vulnerability in Wi-Fi chips and named it KrØØk. This serious flaw, assigned CVE-2019-15126, causes vulnerable devices to use an all-zero encryption key to encrypt part of the user’s communication. In a successful attack, this allows an adversary to decrypt some wireless network packets transmitted by a vulnerable device. KrØØk affects devices with Wi-Fi chips by Broadcom and Cypress that haven’t yet been patched. These are the most common Wi-Fi chips used in contemporary Wi-F...
Recent posts

What to expect from ESET’s newly launched enterprise products and services

What to expect from ESET’s newly launched enterprise products and services If you attended RSA back in May, you probably heard about the upcoming release of ESET’s suite of enterprise solutions. Today’s the day. Built specifically for enterprise, ESET’s new advanced security portfolio is now available—giving you the ability to predict, prevent and mitigate cyberattacks, not simply respond to them. These powerful new tools, based on ESET’s 30 years of experience and innovation, add crucial layers of protection while streamlining management and reporting tasks. From our Endpoint Detection and Response (EDR) tool to threat hunting and monitoring, this is ESET’s most comprehensive enterprise offering ever. ESET Enterprise Inspector is an EDR tool providing real-time data from ESET’S award-winning endpoint security platform. This solution is fully customizable, enabling customers to tailor the solution to their needs, and it provides vastly more visibility for compl...

Can artificial intelligence power future malware

Can artificial intelligence power future malware By Max  What if Artificial Intelligence (AI) could be used to power future malware? Could cybercriminals launch “AI-powered cyberattacks” with crippling consequences to both industries and individuals? Can AI be used as a tool for the attackers? We explore all of these questions and more in a new white paper titled “ Can artificial intelligence power future malware? ” The white paper is a technical look into one of the industry’s most talked about topics, AI and Machine Learning (ML) while examining a variety of themes including how cybercriminals could employ AI in their attacks on mobile environments, IoT or even in targeted scenarios. Within the white paper, we further highlight how AI and ML is often misunderstood and present results of a survey conducted with leading research company OnePoll. Nearly 1000 IT decision makers in the US, UK and Germany were questioned about their perceptions and concerns about AI a...

Can a computer fool you into thinking it is human?

Can a computer fool you into thinking it is human? Robert Epstein was looking for love. The year being 2006, he was looking online. As he recounted in the journal Scientific American Mind , he began a promising email exchange with a pretty brunette in Russia. Epstein was disappointed - he wanted more than a penfriend, let's be frank - but she was warm and friendly. Soon she confessed she was developing a crush on him. "I have very special feelings about you. In the same way as the beautiful flower blossoming in mine soul... I only cannot explain... I shall wait your answer, holding my fingers have crossed..." The correspondence blossomed, but it took a long while for him to notice that Ivana never really responded directly to his questions. She would write about taking a walk in the park, having conversations with her mother, and repeat sweet nothings about how much she liked him. Suspicious, he eventually sent Ivana a line of pure bang-on-the-keyboa...

Curves filter updates in upcoming Gimp 2.10.12

  Curves filter updates in upcoming Gimp 2.10.12 Still, some very cool improvements are also available: Improved Curves tool Layers support for TIFF exporting Support for user-installed fonts on Windows Faster painting Improved symmetry painting support Incremental mode in the Dodge/Burn tool Free Select tool now creates a preliminary selection New Offset tool Improvements and features Improving curves editing and Curves tool Generic curves interaction The interaction with curves in general has been greatly enhanced, which is an improvement both to the Curves tool and all other places where curves need tweaking (currently paint dynamics and input device settings): Relative motion when dragging points When dragging an existing curve point, it won’t “jump” anymore to the cursor position upon pressing the button. Instead it will move relatively to its current position as the cursor moves. This allows selecting a point with a quick click without...

Cybersecurity Hygiene: 8 Steps Your Business Should be Taking

Cybersecurity Hygiene: 8 Steps Your Business Should be Taking Smith Doug Whether you’re managing your enterprise’s cybersecurity or you’ve outsourced it to a service provider, you’re ultimately the one that will be held accountable for a data breach. If your vendor loses your data, your customers and board of directors will likely still hold you responsible. McAfee’s recent report, Grand Theft Data II: The Drivers and Shifting State of Data Breaches,  reveals  a majority of IT professionals have experienced at least one data breach, and on average have dealt with six breaches over the course of their career. Nearly three-quarters of all breaches have required public disclosure or have affected financial results. Enterprise threats are increasing in number and sophistication, while rapidly targeting new vulnerabilities. And while, the top three vectors for exfiltrating data were database leaks, cloud applications, and removable USB drives, IT professionals are m...

A segurança cibernética é uma grande preocupação no Canadá, à medida que o impacto do cibercrime cresce

A segurança cibernética é uma grande preocupação no Canadá, à medida que o impacto do cibercrime cresce 90% dos canadenses entrevistados concordaram que o cibercrime era um "desafio importante para a segurança interna do Canadá" De acordo com uma nova pesquisa que está sendo publicada hoje, a maioria dos canadenses agora vê o cibercrime como uma ameaça ao seu país, enquanto muitos também acreditam que suas chances de serem vítimas do  cibercrime  estão aumentando.  Estas são algumas das principais descobertas do ESET Cybercrime Barometer 2018, uma pesquisa que entrevistou 3.500 adultos na América do Norte (1.000 no Canadá e 2.500 nos EUA). Falando como um experiente pesquisador de  questões  de  segurança cibernética  , fiquei chocado quando vi que nove entre 10 canadenses pesquisados ​​concordaram que o cibercrime era um "desafio importante para a segurança interna do Canadá". Francamente, fiquei chocado ao ver que os entrevistados p...