Security feed

Earlier
Microsoft has said it will not patch a two-decade-old Windows SMB vulnerability, called SMBloris because it behaves comparably to the Slowloris attacks. The flaw will be disclosed and demonstrated during DEF CON. [...]
Wed, Jul 26, 2017
Source: Threat Post
https://apple.insidercdn.com/gallery/22138-26433-22112-26348-21347-24282-cook-foxconnlaughingatmisery-l-l-l.jpg
Apple is apparently planning to build three manufacturing facilities in the U.S., President Donald Trump has announced, though such facilities are most likely to be through a partnership with Foxconn or some other assembly company. Apple Chief Executive Tim Cook allegedly promised the president "three big plants —big, big, big," Trump [...]
Wed, Jul 26, 2017
Source: hitb
https://cdn.arstechnica.net/wp-content/uploads/2017/07/car-ota-updates-800x450.jpg
General Motors has announced plans to offer over-the-air (OTA) software updates "before 2020." The company's CEO, Mary Barra, announced the plan on an analyst call on Tuesday. The capability will require the deployment of a new electric vehicle architecture and a new infotainment system. OTA updates are high on the [...]
Wed, Jul 26, 2017
Source: hitb
https://media.wired.com/photos/5972911681c49267751c0417/master/w_1718,c_limit/SecurityPattern-Art.jpg
The concept of "hacking back" has drawn attention—and generated controversy—lately as geopolitics focuses increasingly on the threat of cyberwar. The idea that cyberattack victims should be legally allowed to hack their alleged assailants has even motivated a bill, the Active Cyber Defense Certainty Act, that representative Tom Graves of Georgia [...]
Wed, Jul 26, 2017
Source: hitb
https://media.wired.com/photos/59778f750c694f7e41194080/master/w_1718,c_limit/flash_ded-02.png
In 2010, Steve Jobs banished Adobe Flash from the iPhone. It was too insecure, Jobs wrote, too proprietary, too resource-intensive, too unaccommodating for a platform run by fingertips instead of mouse clicks. All of those gripes hold true. And now, Adobe itself has finally conceded. The company announced Tuesday that it [...]
Wed, Jul 26, 2017
Source: hitb
All threats have a location. Office closures, an active shooter, system outages, inclement weather, medical emergencies – each one of these critical events can be tied to a location, or multiple locations, thus placing employees in that area in danger. [...]
Tue, Jul 25, 2017
Source: Security magazin
Across the globe, chief security officers (CSO) are under intense pressure to justify what they do, as business operations come under increased scrutiny from the C-suite, shareholders and outside auditors. More than ever, CSOs find themselves in the position of needing to make a strong case for their budgets and [...]
Tue, Jul 25, 2017
Source: Security magazin
At Black Hat, two RIT professors are expected to deliver a talk about the professional skills gap in security and how academic programs are falling short. [...]
Tue, Jul 25, 2017
Source: Threat Post
CRASHOVERRIDE, aka, Industroyer, is the fourth family of malware publically identified as targeting industrial control systems (ICS). It uses a modular design, with payloads that target several industrial communication protocols and are capable of directly controlling switches and circuit breakers. Additional modules include a data-wiping component and a module capable [...]
Tue, Jul 25, 2017
Source: ICS CERT
Researchers have a devised a way to trick a web server into caching pages and exposing personal data to attackers. [...]
Tue, Jul 25, 2017
Source: Threat Post


Print pagePDF pageEmail page

404 Not Found

Not Found

The requested URL /content.php was not found on this server.