Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Cyber war meets real war.

Israel Responds To Cyber Attack With Air Strike On Cyber Attackers In World First

And from Bruce Schneier and Wired.


Microsoft Releases Security Updates to Address Remote Code Execution Vulnerability

Original release date: May 16, 2019

Microsoft has released security ...

Continue Reading →
0

Fallout, RIDL, ZombieLand, MDSUM and other MDS Vulnerabilities

Last year we covered the SPECTRE and MELTDOWN vulnerabilities that affected Intel processors.  This year security researchers have discovered a new series of vulnerabilities around the Microacrhitecture Data Sampling MDA process.  This vulnerability would allow an attacker to read data as it crossed the L1 and L2 data caches on the processor.   These vulnerabilities can affect cloud computing services, and be leveraged by ...

Continue Reading →
0

NIST Cybersecurity Framework Turns 5

If you are a small business owner or even the manager of a bigger enterprise, the NIST Cybersecurity Framework can help you create a cybersecurity program that works.  The framework is voluntary, which means you can pick and choose the parts that work best for your organization.

When developing your program, starting with NIST can make the process simpler.  You ...

Continue Reading →
0

Cyber War is the Next Arms Race

Anyone who thinks were are not already at war in cyber-space is just not paying attention.  I have written extensively on the subject of cyber-war in this blog, most recently about the Estonian cyber-militia.  A list of those articles is below the video.

On April 22, 2019, Mikko Hypponen presented a keynote address titled The Next Arms Race.  A 58 minute video is included below.  ...

Continue Reading →
0

Millions of Chinese-made IoT Devices Easily Hacked says Brian Krebs

If you bought a security camera, webcam, baby monitor, smart doorbell, digital video recorder or other IoT device manufactured in China, there is bad news.  Security flaws have been discovered that can easily  allow an attacker remote access, remote control, and password discovery on affected systems.  These devices can also be hijacked to use in a variety exploits including eavesdropping through ...

Continue Reading →
0
Page 1 of 157 12345...»