|04 Mar 2014||#1|
| || |
How to turn a phone into a covert bugging device? Infect the printer
Security researchers have designed a stealthy eavesdropping attack that sounds like it's straight out of a James Bond movie. It starts with a booby-trapped document that compromises an unpatched laser printer, which in turn converts a popular Internet phone into a covert bugging device.
The proof-of-concept attack exploits currently unpatched vulnerabilities in the Avaya one-X 9608, a popular model of phone that uses the Internet rather than a standard phone line to make and receive calls. Researcher Ang Cui, a Ph.D. candidate at Columbia University and chief scientist at Red Balloon Security, declined to provide many details on the vulnerabilities until users have had time to install a patch that Avaya is expected to release soon. He did say the weaknesses allow devices on the same local network to remotely execute code that causes the device to surreptitiously record all sounds within earshot and transmit them to a server controlled by attackers. He demonstrated a similar bugging vulnerability last year in competing Internet phones designed by Cisco Systems, which has since patched the underlying bugs.
|My System Specs|
|Similar help and support threads for2: How to turn a phone into a covert bugging device? Infect the printer|
|Cybercriminals Turn to Supply Chain, Infect New Computers with Malware||Security News|
|USG Device Not Recognized Error when HTC Inspire Phone plugged||Drivers|
|Virtual PC disconnects skype phone USB device||Virtualization|
|Windows Mobile Device Centre not responding to new phone.||Hardware & Devices|
|Phone's memory card unknown device (error 43)||Drivers|
|Our Sites ||Site Links ||About Us ||Find Us |
© Designer Media Ltd
All times are GMT -5. The time now is 10:01 AM.