logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • ECHO project
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Dkrf ransomware (virus) – Bonus: Decryption Steps
  • Windows 11: The little engine that could, eventually
  • Ransomware: Traditional security tools are not enough to protect
  • Toll fraud malware: How an Android application can drain your wallet
  • Macmillan shuts down systems after likely ransomware attack

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2020-27509 (galaxkey) 26 June 2022
  • CVE-2022-33122 (eyoucms) 24 June 2022
  • CVE-2022-33121 (minicms) 24 June 2022
  • CVE-2021-38879 (jazz_team_server) 24 June 2022
  • CVE-2021-39408 (online_student_rate_system) 24 June 2022

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Threat Actors Overcome Fingerprint Scanning Technologies For Malicious Intent

Posted on 21 December 2020

From cyware.com

Threat Actors Overcome Fingerprint Scanning Technologies For Malicious Intent

Recently, researcher Xianbo Wang from Hong Kong has presented his findings at Black Hat Europe, exploring fingerprint-jacking, a user interface-based attack that targets fingerprints scanned into Android apps.

Read more…

Posted in News

Post navigation

Previous post: WebSecurerr Browser Protection – an extension that claims to protect users from malicious sites but inserts intrusive ads
Next post: Common Security Misconfigurations and Their Consequences
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.