Bluetooth bugs could allow attackers to impersonate devices

Patches to remedy the vulnerabilities should be released over the coming weeks. Cybercriminals could exploit several vulnerabilities in Bluetooth to carry out impersonation attacks and masquerade as a legitimate device during the pairing process, according to the Bluetooth Special Interest Group (SIG). The security flaws, which affect the Bluetooth Core and Mesh Profile specifications, were discovered by researchers at France’s national cybersecurity agency … More Bluetooth bugs could allow attackers to impersonate devices

EU offers bug bounties on popular open source software

The program with a prize pool of almost US$1 million aims to leverage the ‘power of the crowd’ in order to prevent another Heartbleed. The European Union (EU) is rolling out a bug bounty scheme on some of the most popular free and open source software around in a bid to ultimately make the internet … More EU offers bug bounties on popular open source software

ESET malware researchers awarded prize in open-source memory forensics competition

“Something magical happens when reverse engineers write Volatility plugins” – The Volatility Plugin Contest committee on Browserhooks ESET malware researchers Peter Kálnai and Michal Poslušný were awarded 3rd place in this year’s Volatility Plugin Contest for their Browserhooks tool. The duo made use of the knowledge they have gained tracking banking Trojans and Man-in-the-Browser (MitB) malware, and documenting … More ESET malware researchers awarded prize in open-source memory forensics competition