Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


BlueBorne Bluetooth Vulnerabilities

09/12/2017 05:26 PM EDT  Original release date: September 12, 2017

US-CERT is aware of a collection of Bluetooth vulnerabilities, known as BlueBorne, potentially affecting millions of unpatched mobile phones, computers, and Internet of Things (IoT) devices. A remote attacker could exploit several of these vulnerabilities to take control ...

Continue Reading →
0

BlueBorne Bluetooth Hijacker – What Do We Know?

Cybersecurity researchers at Armis Labs have released information about a new attack vector called BlueBorne.  This exploit has the potential to put millions of devices running Windows, Linux, Android or iOS operating systems at risk.

This exploit allows attackers to connect over the Bluetooth radio system with having to first pair the two Bluetooth enabled devices.  Once installed, the attacker has full control of ...

Continue Reading →
0

D-Link Does Bad Security Again

A security research found 10 “critical” security flaws in a popular D-Link wireless router.  This is not the first time that poor security has painted this company with the ugly stick.  They have previously been sued by the Federal Trade Commission, and we have reported about their deficiencies in this blog.

Security researcher Pierre Kim says the D-Link DIR-850L AC1200 Dual Band Gigabit Cloud router has 10 security vulnerabilities serious enough for him ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Talk Like A Pirate Day Coming on September 19

We will start with the good stuff for a change.  Talk Like A Pirate Day is my second favorite unofficial Holiday.  Check out the official website.  Check out the cool pirate swag and order yourself a pirate hoodie or tee shirt.

Arrrgh!


BlueBorne Bluetooth ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Equifax Security Breach Is A Complete Disaster… And Will Almost Certainly Get Worse


‘Pulse wave’ DDoS – another way of blasting sites offline

If there’s one thing we’ve learned, it’s that any new way of DDoSing will reveal that there are a huge number of undefended devices online.


It’s baaaack: Locky ...

Continue Reading →
0

Autonomous Robotic Weapons

We already have some highly sophisticated weapons systems that use computer technology and electronics to do things on a battlefield undreamed of even a few decades ago.  This does include robotic weapons systems.  The important ingredient in all this tech is the presence of human control.  At this point in time it still takes a human to drive these war machines.

But we are not the far from being able to create ...

Continue Reading →
0

NIST Warns Against Lack of Security in Critical Infrastructure

NIST (National Institute for Standards and Technology) released Special Publication 800-53 version 4 recently, and it covers the shortcomings in privacy and security in the national power grid, water control systems, dams, oil and gas utilities and similar computer controlled systems.  There are no coherent or enforceable standards for Industrial Control Systems (ICS) and Supervisory Control And Data Acquisition (SCADA) systems that ...

Continue Reading →
0

Will Artificial Intelligence Beat Real Intelligence?

One of the persistent memes that interest me is the impending event sometimes known as “the singularity.”  This is a probable future where our electronic devices become self-aware and fully autonomous.  We see the beginnings of this happening all around us in devices like Amazon’s Alexa and Echo, The Nest and Google communities of smart devices, self-driving vehicles, and all the Internet of Things (IoT) devices that listen to ...

Continue Reading →
0
Page 3 of 6 12345...»