Teen Arrested for Cyberattack on 911 Emergency System
Eduard Kovacs wrote an interesting post about Teen Arrested for Cyberattack on 911 Emergency System that I would like to share.
"An 18-year-old teen from Arizona...
Hacking the Presidential Election: Can It Happen?
Hackers can leverage lots of technical vulnerabilities to affect election results. But a coordinated attack would be tough, due to voting systems' fragmented nature.
Earlier...
Cloud Adoption Finally on the Rise at Federal Agencies
It’s been more than five years since the Obama administration unveiled its Federal Cloud Computing Strategy, a cloud-first initiative that urged federal agencies to...
VMware Flaws Allow Security Bypass on Mac OS X
Eduard Kovacs wrote an interesting post about VMware Flaws Allow Security Bypass on Mac OS X that I would like to share.
"VMware has patched a...
ARM accelerates secure IoT from chip to cloud
25 October 2016
Cambridge, UK, Oct. 25, 2016 - ARM has released its most comprehensive product suite ever to deliver new levels of security, efficiency,...
But Wait…There’s more: IoT Devices Still Terrible at Security
And the hits just keep on coming. In a new study, security firm ForeScout has shown that it takes fewer than three minutes to...
Android Root Exploits Abuse Dirty COW Vulnerability
Ionut Arghire wrote an interesting post about Android Root Exploits Abuse Dirty COW Vulnerability that I would like to share.
"The “Dirty COW” Linux kernel vulnerability that...
5 Steps to Stronger Vendor Security and Reduced Supply Chain Risk
Watch the webinar: https://www.brighttalk.com/webcast/5418/228055
Third party vendors and digitally connected supply chains provide significant operational and cost efficiencies. But they also expose businesses to significant...
Security concerns prevalent before hack attack on Dyn
MANCHESTER — Americans were leery of someone hacking their internet-enabled security systems and webcams even before last week’s massive hacker attack on Dyn, a...
Slack Flaw Allowed Hackers to Hijack Any Account
Eduard Kovacs wrote an interesting post about Slack Flaw Allowed Hackers to Hijack Any Account that I would like to share.
"A researcher has disclosed...
MOST POPULAR
How healthcare cyber risk teams can plan ahead for HIPAA’s Security...
Enacted in 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the regulatory standard for U.S. healthcare providers, health organizations, and health...