Tag Archive for: control

Multiple Vulnerabilities Found in the Kiddoware Kids Place Parental Control Android App


Kiddoware is the world’s leading parental control solutions company with a wide range of products and  serving over 5 million families worldwide. Kiddoware is committed in helping you to protect your kids while providing you intelligence to be proactive about your childs’ online activities.

Earlier this week, SEC Consult Group identified numerous security flaws in a parental control app called Kids Place, which allowed hackers to access login credentials, send files to a child’s device without parental knowledge, or install malware onto the system. These bad actors were even able to remove all restrictions set on the device and bypass any settings established by the parent.

Dr Klaus Schenk, SVP security and threat research at Verimatrix, commented “The vulnerabilities found in the Kiddowares ‘Parental Control – Kids Place’ app for Android underscores the critical importance of prioritising cybersecurity in both the architecture and design of web servers and applications. The root cause lies in the neglect of basic development principles, highlighting the significance of adhering to secure coding practices.

“Developers should follow reputable security frameworks and cybersecurity tools to support them in building secure applications.

“Prevention tactics include:

  • Thorough security scans and adherence to fundamental principles (e.g., password hashing)
  • Applying security scanning to their web design (e.g., security headers assessment, SSL/TLS configuration audit)
  • Applying app hardening and threat detection technologies to monitor/analyse the app’s functionalities to prevent or flag suspicious behaviours

“The vulnerabilities uncovered in the Kiddowares app are a clear-cut indication that integrating robust security measures at every stage of the app development process in a must. By prioritising security in architecture, design, and development, organisations can protect user data, prevent unauthorised access, and uphold the trust of their users.”

Source…

Protect yourself from hackers taking control of your car


The right software can turn your smartphone into a spy device that watches everything you do. Scary, I know.

Here’s how to check if your phone is infected.

While you’re at it, check your computer. These are the signs that stalkerware is hard at work tracking your web activity, searches, and even the passwords you type in.

Shockingly, your car isn’t immune. With the proper electronics and software techniques, a determined hacker can intercept or block your key fob signal, infiltrate your car’s software, and even remotely control your vehicle.

So, is your connected car hackable? Most likely, yes. Here’s how.

Software hacks

Compromised car apps: Does your car have a smartphone app that allows you to unlock and start it remotely? Almost every car manufacturer offers this convenience in some makes and models.

Account usernames and passwords protect these apps. If hackers can break into your account or exploit a bug in the car’s software, they can compromise your entire vehicle.

My advice: To protect your remote start app, change the default password, use strong and unique credentials and never reuse your passwords from other services. Enable two-factor authentication if you can, and keep that software current.

Telematics exploits: Telematics is the broad term describing a connected system that remotely monitors your vehicle’s behavior. This data may include your car’s location, speed, mileage, tire pressure, fuel use, braking, engine/battery status, and driver behavior.

By now, you know anything connected to the internet is vulnerable to exploitation. Hackers that intercept your connection can track and even control your vehicle remotely. Now that’s scary.

My advice: Before you get a car with built-in telematics, consult with your car dealer about the cybersecurity measures they’re employing on connected vehicles. If you have a connected car, ensure its onboard software is always up to date.

Networking attacks: Here’s a throwback. Cybercriminals can also employ old-school denial-of-service attacks to overwhelm your vehicle and potentially shut down critical functions like airbags, antilock brakes, and door locks.

This attack is…

Source…

Empowering MSSPs and MDR Service Providers to Control the Chaos Caused by Advanced, Highly Evasive Malware


Source…

Hackers can take control of your car – how to protect yourself


The right software can turn your smartphone into a spy device that watches everything you do. Scary, I know. Here’s how to check if your phone is infected. 

While you’re at it, check your computer. These are the signs that stalkerware is hard at work tracking your web activity, searches, and even the passwords you type in. 

Shockingly, your car isn’t immune. With the proper electronics and software techniques, a determined hacker can intercept or block your key fob signal, infiltrate your car’s software, and even remotely control your vehicle. 

So, is your connected car hackable? Most likely, yes. Here’s how. 

THAT’S NOT A HUMAN TALKING TO YOU IN THE FAST FOOD DRIVE-THRU

Join 400,000+ who get my free daily tech news email.  

Software hacks 

Compromised car apps 

Does your car have a smartphone app that allows you to unlock and start it remotely? Almost every car manufacturer offers this convenience in some makes and models.  

Account usernames and passwords protect these apps. If hackers can break into your account or exploit a bug in the car’s software, they can compromise your entire vehicle. 

My advice: To protect your remote start app, change the default password, use strong and unique credentials and never reuse your passwords from other services. Enable two-factor authentication if you can, and keep that software current. 

Telematics exploits 

Telematics is the broad term describing a connected system that remotely monitors your vehicle’s behavior. This data may include your car’s location, speed, mileage, tire pressure, fuel use, braking, engine/battery status, and driver behavior. 

By now, you know anything connected to the internet is vulnerable to exploitation. Hackers that intercept your connection can track and even control your vehicle remotely. Now that’s scary. 

My advice: Before you get a car with built-in telematics, consult with your car dealer about the cybersecurity measures they’re employing on connected vehicles. If you have a connected car, ensure its onboard software is always up-to-date. 

Aerial view of cars in a parking lot

Aerial view of cars in a parking lot

Networking attacks 

Here’s a throwback. Cybercriminals can also employ old-school denial-of-service attacks to…

Source…