Android Root Exploits Abuse Dirty COW Vulnerability
Ionut Arghire wrote an interesting post about Android Root Exploits Abuse Dirty COW Vulnerability that I would like to share.
"The “Dirty COW” Linux kernel vulnerability that...
5 Steps to Stronger Vendor Security and Reduced Supply Chain Risk
Watch the webinar: https://www.brighttalk.com/webcast/5418/228055
Third party vendors and digitally connected supply chains provide significant operational and cost efficiencies. But they also expose businesses to significant...
Security concerns prevalent before hack attack on Dyn
MANCHESTER — Americans were leery of someone hacking their internet-enabled security systems and webcams even before last week’s massive hacker attack on Dyn, a...
Slack Flaw Allowed Hackers to Hijack Any Account
Eduard Kovacs wrote an interesting post about Slack Flaw Allowed Hackers to Hijack Any Account that I would like to share.
"A researcher has disclosed...
Stepping Up Security for IoT
Check out this New York Times article how the internet of things will drive consumers to take even greater precautions with their technology. This article...
Sarvdap Spambot Checks IP Blacklists
Ionut Arghire wrote an interesting post about Sarvdap Spambot Checks IP Blacklists that I would like to share.
"The Sarvdap spambot was recently observed checking the...
HomeKit is where the dearth is – no one wants Apple’s IoT tech
Is anyone buying it – figuratively or literally?
It's been four months since Apple half-launched its smart-home/internet-of-things service through the introduction of a new app...
Battling the Botnet Armies
Marie Hattar wrote an interesting post about Battling the Botnet Armies that I would like to share.
"Botnet armies have become bigger, more active and more...
Dyre Authors Apparently Working on New Banking Trojan
Eduard Kovacs wrote an interesting post about Dyre Authors Apparently Working on New Banking Trojan that I would like to share.
"At least one of the...
Researchers Build Configuration Extractor for Locky Ransomware
Ionut Arghire wrote an interesting post about Researchers Build Configuration Extractor for Locky Ransomware that I would like to share.
"Researchers from Cisco Talos have created a new tool...
MOST POPULAR
Will 2025 be the year of no more passwords?
A once tried-and-true security measure, passwords have failed to develop at a rate necessary to keep up with the vastness of the web and...