The bug, now fixed, could be abused to steal sensitive and private data from other apps.

« Acording to Electrek, an FBI complaint details how the feds helped foil a plot by Russian hackers to target Tesla’s Nevada Gigafactory with a massive ransomware hack and data breach.
It’s worth noting that the complaint itself never explicitly says that the target of the hack was Tesla, though its Gigafactory is located outside Sparks, Nevada. Electrek, though, is reporting as fact that Tesla is the target. We’ve reached out to Tesla for additional information and we’ll update if any new info comes to light. »
Intriguingly, it sounds as though the hackers weren’t just after ransom.
By Chuck Brooks In FORBES
The surge in digital connectivity and more sophisticated cyber-threats has promulgated the need for smart cybersecurity. Smart Cybersecurity is a logical reaction to try to manage risk by lessening security gaps often posed by reliance on manual processes that are impacted by a continual cybersecurity skills shortage and the administrative burdens of data security management.
Despite the challenges, there is promise for reducing dependence on humans and bolstering cybersecurity capabilities. A myriad of evolving cognitive technologies can help us enhance cybersecurity and navigate the increasingly malicious and disruptive cyber threat landscape. They include:
• Artificial Intelligence
O,.o.
Millions of us use Bluetooth wireless communications every day—to make phone calls when driving, with our fitness trackers, streaming at work or play. Innocent enough, seemingly. But no technology comes without a warning: a recently discovered Bluetooth vulnerability allows hackers to spy on your conversations or take control of your smart phone. The vulnerability deals with the encryption between two devices. It even has a name—a KNOB hack (Key Negotiation Of Bluetooth).
This is not the first time Bluetooth has been hacked and it likely won’t be the last. And this one has its limitations. To take advantage of the KNOB vulnerability the hacker has to be in close proximity of your phone. There is also currently no evidence that this vulnerability has been exploited maliciously.
Still, for the sake of cyber hygiene, take the following steps to protect yourself from a KNOB hack: • Install updates for your smart phone as they become available. • Remove devices paired with your phone that you no longer need or recognize. • Turn off Bluetooth when you are not using it.
Hackers are calling employees working from home and tricking them into accessing phishing pages for corporate domains.
Shalev Hulio wants to explain himself.
Normally, silence and secrecy are inherent in the spy business. For nine full years, Hulio never talked publicly about his billion-dollar hacking company—even when his hacking tools were linked to scandal or he was accused of being complicit in human rights abuses around the world. Lately, though, he’s speaking up.
“People don’t understand how intelligence works,” Hulio tells me over a video call from Tel Aviv. “It’s not easy. It’s not pleasant. Intelligence is a shitty business full of ethical dilemmas.”
There were 94 total losses reported around the shipping world in 2017, down 4 percent year-on-year, according to Allianz Global Corporate & Specialty SE’s (AGCS) Safety & Shipping Review 2018.
The report indicates that large shipping losses have declined by more than a third (38%) over the past decade and that the downward trend continued into 2017, marking the second lowest losses in 10 years after 2014.
However, Allianz stressed that the sinking of the oil tanker Sanchi and the impact of the NotPetya malware on harbor logistics underline that the shipping sector is being tested by a number of traditional and emerging risk challenges.