Fallout, RIDL, ZombieLand, MDSUM and other MDS Vulnerabilities

Last year we covered the SPECTRE and MELTDOWN vulnerabilities that affected Intel processors.  This year security researchers have discovered a new series of vulnerabilities around the Microacrhitecture Data Sampling MDS process.  This vulnerability would allow an attacker to read data as it crossed the L1 and L2 data caches on the processor.   These vulnerabilities can affect cloud computing services, and be leveraged ...

Continue Reading →
0

Cyber War is the Next Arms Race

Anyone who thinks were are not already at war in cyber-space is just not paying attention.  I have written extensively on the subject of cyber-war in this blog, most recently about the Estonian cyber-militia.  A list of those articles is below the video.

On April 22, 2019, Mikko Hypponen presented a keynote address titled The Next Arms Race.  A 58 minute video is included ...

Continue Reading →
0

Millions of Chinese-made IoT Devices Easily Hacked says Brian Krebs

If you bought a security camera, webcam, baby monitor, smart doorbell, digital video recorder or other IoT device manufactured in China, there is bad news.  Security flaws have been discovered that can easily  allow an attacker remote access, remote control, and password discovery on affected systems.  These devices can also be hijacked to use in a variety exploits including eavesdropping ...

Continue Reading →
0

Top Jobs In Cybersecurity Pay Six Figures

Are you working in information technology, but your career has gone stagnant or your work become boring and repetitive?  Are you graduating from high school and considering career paths.  Are you in college earning a “computer science” degree and wondering if you will be writing code your whole life?  Maybe you should consider a career in cybersecurity.

I was interested in ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


May the Fourth Be With You

It’s Star Wars Day!!  May the force be with you.  Jedis, Greys, and Sith unite for a day for video watching and beer.


Huge Win 10 version 1903 requires 32 GB to install

You might want to check your free space on your C drive before Patch ...

Continue Reading →
0

Guest Post – Mobile App Security Threats and Secure Best Practices Part 2

A guest post by KC Karnes

Mobile App Security Exploit Examples: Painful Real-life Lessons

The climate around mobile app security is heating up.

Mobile app vulnerabilities are exploited every day, resulting in expensive data breaches and loss of public trust.

In this section, we will try to learn from the failures of other companies and highlight how real the threats outlined above can be.

Timehop Fails To Trust Two-Factor Authentication

Starting in December of 2017, TimeHop ...

Continue Reading →
0
Page 39 of 107 «...1020303738394041...»