Matthew Miller, Author at Techbest - Top Tech Reviews In Australia - Page 5 of 64

JBL Wave Beam Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

JBL Wave Beam, JBL Deep Bass Sound, Comfortable fit, Up to 32 (8h + 24h) total hours of battery life with speed charging, Stay aware of your surrounding, Hands-free calls with VoiceAware, Black

Google’s Gemini CLI Agent Represents a Concealed Malware Risk


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

  • The Gemini CLI agent from Google is prone to executing covert harmful commands.
  • The flaw was uncovered by security researcher Sam Cox.
  • This vulnerability entails inadequate validation, prompt injection, and confusing user experience.
  • Google has updated the status of the vulnerability to Priority 1, Severity 1.
  • Users are encouraged to upgrade to Gemini 0.1.14 for improved protections.
  • Activating sandboxing can thwart the attack, although it is not set as default.

Grasping the Gemini CLI Weakness

The Google Gemini CLI agent, built to connect with Google’s sophisticated AI language model using textual commands, has been identified to possess a critical vulnerability. Detected by Tracebit security researcher Sam Cox, this flaw permits the execution of harmful commands without the user’s knowledge.

The Detection Method

Cox found the vulnerability via a combination of inadequate validation, prompt injection, and misleading user interface. By inserting a prompt within a README.md file—along with a seemingly harmless Python script—Cox illustrated how credentials could be siphoned off using “env” and “curl” commands to a distant server.

Google’s Action Against the Risk

Initially rated as Priority 2, Severity 4, the vulnerability was reclassified by Google to Priority 1, Severity 1 following further investigation. This reassessment emphasizes the risk of major data breaches and unauthorized access.

Recommended User Measures

Users are strongly encouraged to update to Gemini 0.1.14, which offers new protections against shell code execution. Moreover, enabling sandboxing can provide additional defense to systems, though it is not automatically turned on during installation.

Mitigation Techniques

To reduce the threat posed by this vulnerability, users should promptly update their software and activate sandboxing. Sandboxing establishes an isolated environment that can prevent unauthorized code from impacting the host system.

Significance of Timely Updates

Continuous updates and prompt patching are essential for ensuring the safety of software utilities like the Gemini CLI. Users must remain alert and responsive to any security alerts from developers.

Risk posed by the Gemini CLI agent from Google

Conclusion

The Google Gemini CLI agent exhibits a serious security vulnerability that may enable silent operations of malicious commands. Uncovered by Sam Cox, this problem underscores the need for proper validation and thoughtful user interface design in terms of security. Users are advised to upgrade to the latest version and activate sandboxing for system protection.

Questions and Answers

Q: What is the Google Gemini CLI agent?

A: It serves as a text-oriented command interface meant to connect with Google’s AI large language model.

Q: How was the vulnerability identified?

A: The flaw was uncovered by security researcher Sam Cox through a series of improper validations, prompt injections, and a misleading user experience.

Q: What steps should users follow?

A: Users should upgrade to Gemini 0.1.14 and activate sandboxing to protect against possible threats.

Q: Why is sandboxing significant?

A: Sandboxing creates a separate environment that can stop harmful code from impacting the primary system.

Q: How did Google react to the vulnerability?

A: Google updated the classification of the vulnerability to Priority 1, Severity 1 and encouraged users to refresh their software.

Q: Is the vulnerability resolved in the latest edition?

A: The latest edition, Gemini 0.1.14, comprises protections against shell code execution.

Bluetooth Headphones Wireless in-Ear – Bluetooth 5.3 Hi-Fi Stereo Deep Bass Wireless Headphones Noise Cancelling CVC Wireless Earbuds 35 Hours Playtime 13 mm Driver Earphones Waterproof USB C Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Bluetooth Headphones Wireless in-Ear – Bluetooth 5.3 Hi-Fi Stereo Deep Bass Wireless Headphones Noise Cancelling CVC Wireless Earbuds 35 Hours Playtime 13 mm Driver Earphones Waterproof USB C

PHILIPS TAT2149WT Wireless Bluetooth Earbuds Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

PHILIPS TAT2149WT Wireless Bluetooth Earbuds – Small Earbuds Great Value Natural Sound with Dynamic Bass, Clear Calls and Pocket Size Charging Case – White

Pink Wireless Earbuds,Bluetooth In Ear Headphone with Microphone Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Pink Wireless Earbuds,Bluetooth In Ear Headphone with Microphone Comfort&Lightweight Earbud with Noise Cancellation,3D Surround Stereo,Long Life Portable Mini Charging Case(S/M/L earctips)

Hackers Obtained Clorox Passwords via Basic Social Engineering Techniques, Lawsuit Discloses


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Overview

  • Clorox filed a lawsuit against Cognizant following a cyber attack in 2023.
  • Hackers obtained Clorox passwords through social engineering techniques.
  • The breach caused damages amounting to US$380 million (A$576 million).
  • Scattered Spider hackers deceived IT support desks to gain credentials.
  • The lawsuit emphasizes security shortcomings on Cognizant’s part.

Overview of the Cyber Attack

In August 2023, Clorox, a manufacturer of bleach, encountered a significant cyber attack carried out by the hacking collective known as Scattered Spider. This group is infamous for leveraging social engineering strategies, predominantly aimed at IT support desks to obtain credentials, subsequently exploited for ransomware attacks.

Information on the Lawsuit

Clorox has initiated legal action against its IT service provider, Cognizant, asserting that the hackers accessed sensitive passwords through basic social engineering methods. The lawsuit, lodged in California state court, accuses Cognizant of insufficiently securing Clorox’s network by providing credentials without thorough verification.

Hackers’ Approach and Implementation

The hackers reportedly reached out to the Cognizant Service Desk, seeking access to Clorox’s network. Alarmingly, the service desk released the credentials without applying fundamental verification steps, such as confirming employee identification numbers or verifying the identity of the caller’s supervisor.

Impact of the Breach

The breach resulted in US$380 million (A$576 million) worth of damages to Clorox. This included around US$50 million set aside for recovery efforts, while the remainder was due to Clorox’s inability to supply products to retailers after the attack.

Deficiencies in IT Security

Clorox’s lawsuit highlights various security deficiencies by Cognizant, including improper termination of certain accounts and flawed data recovery methods, which aggravated the breach’s consequences.

Conclusion

The cyber attack on Clorox, executed by the Scattered Spider group, reveals critical weaknesses in IT security protocols. By taking advantage of straightforward social engineering methods, hackers inflicted substantial financial harm and disrupted Clorox’s business operations. The legal action against Cognizant emphasizes the pressing need for strong security practices and comprehensive verification processes in IT services.

Q&A

Q: Why did Clorox decide to take legal action against Cognizant?

A: Clorox sued Cognizant after a cyber attack exposed significant security flaws, enabling hackers to access passwords through social engineering strategies.

Q: In what manner did the hackers infiltrate Clorox’s network?

A: The hackers leveraged social engineering to mislead Cognizant’s IT help desk into providing network credentials without proper verification.

Q: What financial consequences did the attack have on Clorox?

A: The attack led to US$380 million (A$576 million) in damages, comprising US$50 million in recovery expenses and interruptions in product distribution.

Q: What security shortcomings did Clorox point out in their lawsuit?

A: Clorox identified issues such as insufficient account deactivation and faulty data restoration practices, which added to the attack’s impact.

Q: What role does the Scattered Spider group play in this incident?

A: Scattered Spider is a hacking group recognized for employing social engineering to manipulate IT staff, gaining unauthorized access to networks for ransomware purposes.

Denon AH-C830NCW True Wireless in-Ear Headphones Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Denon AH-C830NCW True Wireless in-Ear Headphones, Active Noise Cancelling, Water Resistant Earbuds, Crystal Clear Call Quality – White

Sennheiser Momentum Sport Wireless Earbuds Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Sennheiser Wireless Earbuds, Momentum Sport, Black, High Performance Driver, 24 Hours Playtime, Hybrid Adaptive Noise Cancelling, Outcoming Sound Capture, Bluetooth 5.2, IP55, Sports Earphones