Security news that informs and inspires

All Articles

2376 articles:

Q&A: Joe FitzPatrick

Hardware security researcher Joe FitzPatrick explains how non-experts should assess claims of hardware implants and backdoors.

Hardware, Q&a

Decipher Podcast: Joe FitzPatrick

Dennis Fisher speaks with hardware security researcher Joe FitzPatrick about finding and verifying hardware implants.

Podcast, Hardware

DHS Warns Implanted Medical Devices Can Be Modified Wirelessly

The Department of Homeland Security's Cybersecurity and Infrastructure Security Agency warned in an advisory that cardio defibrillators from medical device company Medtronic can be modified while still implanted in patients. Without access control, the defibs can't differentiate between authorized and unauthorized instructions.

Hardware, Medical Devices

Into the Pandora’s Box of Hardware Implants

Joe FitzPatrick, one of the small number of hardware security experts, says security teams and operators need to ask hard questions when they see claims of malicious hardware implants.

Hardware

Scanning for Active IPv6 Hosts With UPnP

Security researchers and enterprise defenders have many Internet-wide scanning tools at their disposal. Researchers at Cisco Talos have developed a way to scan for hosts with IPv6 addresses using the UPnP protocol.

Ipv6, Internet, Iot Security, Internet of Things

Toward a Framework for Misinformation Campaigns

Researchers are developing a framework to analyze and describe misinformation campaigns, similar to the MITRE ATT&CK framework.

Social Engineering, Misinformation, Disinformation

Patch Microsoft Office Flaws Before Others

From an attacker’s perspective, the wider the net cast, the more number of potential victims caught. So it’s no surprise that Recorded Future research indicates attackers continue to rely heavily on exploits targeting Microsoft applications.

Patching, Exploit Kits, Microsoft, Malware

Android Q Steps Up Location Privacy

Google's Android Q will include a handful of changes to the way that the OS deals with location privacy and other app permissions.

Privacy, Android

Deciphering Ocean’s Eleven

Ocean's Eleven has one of the great ensemble casts of all time, an air-tight script, and an audacious heist at its heart.

Podcast, Hacker Movies

Slack Adds Key Management for Enterprises

Slack Enterprise Key Management tool will let organizations with strict data protection requirements use their own encryption keys in their Slack workspace.

Encryption, Data Protection

IoT Security Bills Use Federal Spending as Leverage

Bills introduced in the House and Senate this week would require vendors selling IoT devices to the government to adhere to strict security guidelines.

Iot Security, Government

Senators Ask For Transparency on Attacks on Senate Computers

Ron Wyden and Tom Cotton are asking the Senate Sergeant at Arms for numbers on cyber attacks on Senate computers.

Government

Deciphering Mission Impossible

The first Mission: Impossible film includes some ingenious hacking scenes and launched a multi-billion dollar franchise.

Podcast, Hacker Movies

New Strains of PoS Malware Continue to Rise

Two new kinds of point-of-sale malware have emerged recently and have been seen in use against various targets.

Malware

‘People Have a Right to Free Speech, But a Bot Doesn’t’

In the era of disinformation, manipulation and influence operations, platform providers, enterprises, and government agencies are working to find policy and technical solutions.

Rsac2019, Government