Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Anniversary of the dedication of the ENIAC computer in 1946.

ENIAC (/ˈiːniæk,  ˈɛ-/; Electronic Numerical Integrator and Computer) was among the earliest electronic general-purpose computers made. It was Turing-complete, digital and able to solve “a large class of numerical problems” through reprogramming.

ENIAC was completed in 1945 and first put to work for practical purposes on December 10, 1945.  ENIAC was formally dedicated ...

Continue Reading →
0

Infographic – The Internet of Hackable Things in Your Daily Life

Today I share an infographic provided by repeat guest poster Siege Media.  The Internet of Things is full of cool new devices that connect to the network and Internet, and can be used from distant locations.  But if used without proper security controls, these smart devices can provide an easy remote entry point for an attacker.

I have not republished the excellent article that was part of the original post, 

Continue Reading →
1

Guest Post – How to Use Your Laptop’s Bluetooth Connection Securely

Using Bluetooth to connect devices to your laptop is convenient but also risky. Discover what those risks are and how to minimize them.

Many laptops come with Bluetooth connectivity. Thanks to this wireless technology, you can easily connect a keyboard, mouse, headset, or other peripheral to your laptop. You can even use it to send files to a printer or ...

Continue Reading →
0

Trusted Sources for Threat Intelligence and Cybersecurity Information

Just how in the heck does a cybersecurity professional stay on top of the rapidly evolving threat landscape, the ever changing attacks and exploits, and new security solutions? I can assure you it involves a lot of reading.

Last month the Twin Cities chapter of (ISC)2 held a meeting on the topic of trusted sources for threat intelligence.  It seemed like a great topic idea, so I decided to share my list ...

Continue Reading →
0

What The Heck Is A Zero-Day?

What is a “zero-day,” exactly?   In information security, occasionally there is a brand new cybersecurity vulnerability or exploit in the news, and the reporter calls it a “zero-day” exploit.  What are they talking about.  This is a concept similar to “patient zero” in medical epidemiology. This is where the bad thing started to happen.

A zero-day vulnerability is a flaw ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Detecting Credit Card Skimmers

Modern credit card skimmers hidden in self-service gas pumps communicate via Bluetooth. There’s now an app that can detect them:

The team from the University of California San Diego, who worked with other computer scientists from the University of Illinois, developed an app called Bluetana which ...

Continue Reading →
0

Android OS Set Top Boxes Target of Botnet

A new botnet known as “Ares” is targeting misconfigured set top boxes that run the light-weight Android OS.  Two older botnets, Fbot and Trinity, are also targeting this misconfiguration.  A module, the Android Debug Bridge (ADB), is the specific vulnerability, and it should not be available at all.  The debug bridge is used by software developers during code writing to check for flaws, ...

Continue Reading →
0

Hack Turns iPhones and Android phones into Ultimate Surveillance Tool

If you visited certain websites with your iPhone (or Android or Windows device**) over the last two years, it is possible that your iPhone downloaded and installed malware that allowed attackers to intercept and record everything you did and everywhere you went with your iPhone.  This includes real-time location information, all your emails and messaging (including encrypted versions such ...

Continue Reading →
0

Many Popular Printers Provide Easy Attack Surfaces

Printers seems to be simple devices that we use to convert information into a physical form, usually text on paper.  But all printers are really small special purpose computers.  They have processors, RAM memory, and storage in the form of solid state chips or entire hard drives.  The operating system is often some form of Linux.  They usually can be accessed and configured ...

Continue Reading →
0
Page 1 of 12 12345...»