Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Today’s Weekend Update is our 100th edition

Somehow we have published 100 of these Saturday cybersecurity news roundups.  Hope you have enjoyed them, and maybe learned a thing or two.  Leave a comment and the first 10 commentators will receive some WyzGuys swag.


Boeing 737-MAX Crashes Brought on by Flight Computers

A really scary article about what went wrong with the Boeing 737-MAX that caused the death of 346 people in two crashes.  You may never want to fly this bird after reading the article.


Towards an Information Operations Kill Chain

Bruce Schneier discusses methods to counteract and disrupt the current interference of Russian “Active Measures” in the western election cycle.  “…it’s time to conceptualize the “information operations kill chain.” Information attacks against democracies, whether they’re attempts to polarize political processes or to increase mistrust in social institutions, also involve a series of steps. And enumerating those steps will clarify possibilities for defense.”

And a related article: Defending Democracies Against Information Attacks


Companies will stop storing data in Australia, Microsoft warns

Australia’s controversial anti-encryption laws came under independent scrutiny this week as tech leaders criticized the proposed rules.  See our previous article, Stupid Politicians – Australia Edition


NIST tool boosts chances of finding dangerous software flaws

NIST thinks it has reached an important milestone in complex software testing with something called Combinatorial Coverage Measurement (CCM).


Cops need warrant for both location history and phone pinging, says judge

It’s one of the first location data privacy cases to grapple with the warrant and surveillance implications of the Carpenter decision.


Piracy streaming apps are stuffed with malware

Shocking!  When you steal videos, the criminals running the platform steal your credit card info!  Researchers have found that hackers are exploiting vulnerable piracy streaming devices to steal credit card data or rope them into botnets.


 

0

About the Author:

Cybersecurity analyst, pen-tester, trainer, and speaker. Owner of the WyzCo Group Inc. In addition to consulting on security products and services, Bob also conducts security audits, compliance audits, vulnerability assessments and penetration tests. Bob also teaches Cybersecurity Awareness Training classes. Bob works as an information technology and cybersecurity instructor for several training and certification organizations. Bob has worked in corporate, military, government, and workforce development training environments Bob is a frequent speaker at professional conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference in 2016, 2017, 2018, 2019, the (ISC)2 World Congress 2016, and the ISSA International Conference 2017, and many local community organizations, including Chambers of Commerce, SCORE, and several school districts. Bob has been blogging on cybersecurity since 2006 at http://wyzguyscybersecurity.com
  Related Posts

Add a Comment


This site uses Akismet to reduce spam. Learn how your comment data is processed.