Home Artists Posts Import Register

Downloads

Content

New bluetooth flaws have been found, the USPS used vulnerable systems for years, and voatz wants to  make it harder for you to do your job! All that coming up now on ThreatWire. #threatwire #hak5


Links:

Wifi Pineapple Mk VII Unboxing and GIVEAWAY!: https://www.youtube.com/watch?v=Tt1rh45g1rM&t


ThreatWire on Youtube: https://youtu.be/9vCOXPbXmlo


Support me on alternative platforms! https://snubsie.com/support


Shop ThreatWire Merch Directly! - https://snubsie.com/shop


Shop ThreatWire Merch on Teespring! - https://teespring.com/stores/shannons-store-24


http://www.youtube.com/ShannonMorse?sub_confirmation=1  --  subscribe to my tech channel!


ThreatWire is only possible because of our Patreon patrons! Sign up now for ACTION ALERTS! Help me reach our next ThreatWire goal to unlock merch tiers and an audio podcast! https://www.patreon.com/threatwire 


Links:

New Bluetooth Vulnerability:

https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/

https://thehackernews.com/2020/09/new-bluetooth-vulnerability.html

https://threatpost.com/bluetooth-bug-mitm-attacks/159124/


USPS using outdated vulnerable systems:

https://www.uspsoig.gov/sites/default/files/document-library-files/2020/20-251-R20.pdf

https://www.vice.com/en_us/article/akzpd5/postal-service-used-apps-that-had-catastrophic-vulnerabilities-for-years

https://www.businessinsider.com/us-postal-service-used-outdated-systems-2020-9


Voatz voting company wants to make security research harder:

https://www.supremecourt.gov/DocketPDF/19/19-783/153062/20200903122434600_Voatz%20Amicus%20Brief.pdf

https://www.cnet.com/news/online-voting-company-pushes-to-make-it-harder-for-researchers-to-find-security-flaws/

https://www.cnet.com/news/security-flaws-mar-mobile-voting-app-researchers-say/

https://www.cyberscoop.com/voatz-cfaa-supreme-court-mobile-security-voting/



Photo credit:

https://upload.wikimedia.org/wikipedia/commons/6/6d/USPS_mailboxes.jpg




-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆

Our Site → https://www.hak5.org

Shop →  https://www.hakshop.com

Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1

Support → https://www.patreon.com/threatwire

Contact Us → http://www.twitter.com/hak5

Threat Wire RSS → https://shannonmorse.podbean.com/feed/

Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999


Host: Shannon Morse → https://www.twitter.com/snubs

Host: Darren Kitchen → https://www.twitter.com/hak5darren

Host: Mubix → http://www.twitter.com/mubix

-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆

Comments

Anonymous

While I can understand both perspectives in the Voatz problem (that is wanting to collaborate with researchers so that they can identify malicious actors) and the researchers. But the issue is that if Voatz only allows researchers to hit certain servers. The testing done there might not be valid compared to the production server that is actively in use.