Cybersecurity- Insiders

Android Root Exploits Abuse Dirty COW Vulnerability

 Ionut Arghire wrote an interesting post about Android Root Exploits Abuse Dirty COW Vulnerability that I would like to share. "The “Dirty COW” Linux kernel vulnerability that...
Cybersecurity- Insiders

5 Steps to Stronger Vendor Security and Reduced Supply Chain Risk

Watch the webinar: https://www.brighttalk.com/webcast/5418/228055 Third party vendors and digitally connected supply chains provide significant operational and cost efficiencies. But they also expose businesses to significant...
Cybersecurity- Insiders

Security concerns prevalent before hack attack on Dyn

MANCHESTER — Americans were leery of someone hacking their internet-enabled security systems and webcams even before last week’s massive hacker attack on Dyn, a...
Cybersecurity- Insiders

Slack Flaw Allowed Hackers to Hijack Any Account

Eduard Kovacs wrote an interesting post about Slack Flaw Allowed Hackers to Hijack Any Account that I would like to share. "A researcher has disclosed...
Cybersecurity- Insiders

Stepping Up Security for IoT

Check out this New York Times article how the internet of things will drive consumers to take even greater precautions with their technology.  This article...
Cybersecurity- Insiders

Sarvdap Spambot Checks IP Blacklists

Ionut Arghire wrote an interesting post about Sarvdap Spambot Checks IP Blacklists that I would like to share. "The Sarvdap spambot was recently observed checking the...
Cybersecurity- Insiders

HomeKit is where the dearth is – no one wants Apple’s IoT tech

Is anyone buying it – figuratively or literally? It's been four months since Apple half-launched its smart-home/internet-of-things service through the introduction of a new app...
Cybersecurity- Insiders

Battling the Botnet Armies

Marie Hattar  wrote an interesting post about Battling the Botnet Armies that I would like to share. "Botnet armies have become bigger, more active and more...
Cybersecurity- Insiders

Dyre Authors Apparently Working on New Banking Trojan

Eduard Kovacs wrote an interesting post about Dyre Authors Apparently Working on New Banking Trojan that I would like to share. "At least one of the...
Cybersecurity- Insiders

Researchers Build Configuration Extractor for Locky Ransomware

Ionut Arghire wrote an interesting post about Researchers Build Configuration Extractor for Locky Ransomware that I would like to share. "Researchers from Cisco Talos have created a new tool...