chorus.fm: Smart TV Hack Embeds Attack Code Into Broadcast Signal—No Access Required

chorus.fm
imp?s=124190&layout=marquee&li=1&m=08faf43facebb360138f725312d6d917&p=492877a83a15c7636ccffa609b328d2673c4e62c
imp?s=124191&sz=1x1&li=1&m=08faf43facebb360138f725312d6d917&p=492877a83a15c7636ccffa609b328d2673c4e62c imp?s=124192&sz=1x1&li=1&m=08faf43facebb360138f725312d6d917&p=492877a83a15c7636ccffa609b328d2673c4e62c
imp?s=124193&sz=116x15&li=1&m=08faf43facebb360138f725312d6d917&p=492877a83a15c7636ccffa609b328d2673c4e62c imp?s=124194&sz=69x15&li=1&m=08faf43facebb360138f725312d6d917&p=492877a83a15c7636ccffa609b328d2673c4e62c
Smart TV Hack Embeds Attack Code Into Broadcast Signal—No Access Required Apr 3rd 2017, 19:16, by Jason Tate
Dan Goodin, writing for Ars Technica:

The proof-of-concept exploit uses a low-cost transmitter to embed malicious commands into a rogue TV signal. That signal is then broadcast to nearby devices. It worked against two fully updated TV models made by Samsung. By exploiting two known security flaws in the Web browsers running in the background, the attack was able to gain highly privileged root access to the TVs. By revising the attack to target similar browser bugs found in other sets, the technique would likely work on a much wider range of TVs.

Anuncios

Responder

Introduce tus datos o haz clic en un icono para iniciar sesión:

Logo de WordPress.com

Estás comentando usando tu cuenta de WordPress.com. Cerrar sesión / Cambiar )

Imagen de Twitter

Estás comentando usando tu cuenta de Twitter. Cerrar sesión / Cambiar )

Foto de Facebook

Estás comentando usando tu cuenta de Facebook. Cerrar sesión / Cambiar )

Google+ photo

Estás comentando usando tu cuenta de Google+. Cerrar sesión / Cambiar )

Conectando a %s