Title Published Date System Number of Articles Actions
5G Network Vulnerability Allows Data Theft and Privacy Threats 2019-02-01 1. Authentication and Key Agreement (AKA) system in 5G network [80745] 1 View Details
Twitter Glitch Exposed Android Users' Protected Tweets Since 2014 2019-01-18 1. Twitter Android app 2. "Protect your Tweets" option 3. Twitter's data protection mechanisms [80332] 1 View Details
Software Glitch at Ladbrokes: Bet Acceptance Issue and Settlement Controversy 2019-01-10 1. Ladbrokes' software systems [Article 88162, Article 79874] 2 View Details
Smart Doorbell Hack Allows Fake Footage Injection and Eavesdropping. 2019-02-28 1. Ring smart doorbells made by Amazon-owned Ring [80887] 1 View Details
WhatsApp Face ID/Touch ID Bypass Vulnerability on iPhones 2019-02-21 The system that failed in the software failure incident reported in Article 80885 is: 1. WhatsApp's Face ID and Touch ID authentication system [80885]. 1 View Details
Exposed Database of Chinese Facial Recognition Company Leads to Privacy Breach 2019-02-13 The system that failed in the software failure incident reported in Article 80997 is: 1. SenseNets' facial recognition database security system [80997] 1 View Details
Electric Scooter Vulnerability Allows Remote Control by Hackers 2019-02-12 1. Xiaomi M365 electric scooter's password authentication process via Bluetooth communications [81152, 81115] 2. Bluetooth module in Xiaomi M365 scooter that allows communication with the smartphone app without proper authentication [81115] 2 View Details
Nest Camera Security Breach Due to Weak Passwords and Hacking 2019-02-07 The system that failed in the software failure incident reported in Article 81137 was the security system of Nest cameras due to users using weak passwords and not taking advantage of advanced security measures offered to them on their devices. Specifically, the following components failed: 1. Nest security cameras' security system 2. Weak passwords used by Nest camera owners These failures led to incidents where hackers were able to take over Nest cameras and perform unauthorized activities, such as spying on users, issuing threats, and controlling other smart devices in the home. 1 View Details
Security Flaws in 4G and 5G Networks Allow Intercepting Calls. 2019-02-25 1. Cellular paging protocols in 4G and 5G networks [81139] 1 View Details
KeySteal Exploit on Mac Keychains Exposes Passwords to Hackers 2019-02-06 1. Mac's internal stores of passwords, called keychains [81149] 2. MacOS running Apple's Mohave operating system (or any MacOS released prior to that) [81149] 1 View Details