Security Boulevard’s 5 Most Read Stories for the Week, August 13-17

A new week, a new crop of security stories. Last week, lack of user privacy, man-in-the-attack, dumb privacy rules and Intel CPUs vulnerabilities made the headlines. In addition, we discussed how to get smarter about securing smart technologies.

User Privacy Threatens Security Defenses

Lack of User Privacy Threatens Security Defenses

Data threats come from three general fronts: individuals sharing too much information, data breaches and corporations selling increasingly granular customer data. Security professionals frequently sound warnings for the first two. The last one is rarely acknowledged as a security threat and more commonly labelled a privacy issue. But security and ...
The Internet of Things: Getting Smarter about Securing Smart Technologies

The Internet of Things: Getting Smarter about Securing Smart Technologies

The Internet of Things: Getting Smarter about Securing Smart Technologies Scott Carter Wed, 08/15/2018 - 19:13 Machine identities are not being secured in the same way as human identities online, resulting in a lack of encryption across networks, among other things. When two machines can talk without encryption, or are ...
Dark Side Quantum Computing

New Foreshadow Vulnerabilities Defeat Memory Defenses on Intel CPUs

Security researchers have uncovered a new way to exploit the speculative execution feature of Intel CPUs to bypass memory security barriers and leak protected information.The vulnerability, known as Foreshadow or L1 Terminal Fault (L1TF), has three variants. The original variant was discovered by a team of researchers from KU Leuven ...
Dumb Privacy Rules

Dumb Privacy Rules: How Lawyers are Ruining It for Everyone

Father Guido Sarducci, comedian Don Novello’s eccumenical doppleganger, had a routine where he discussed the idea of the “5-minute University,” where he would teach you in five minutes everything you would remember about college five years after graduating (Economics? Supply and Demand). Sometimes it pays to reduce a law, regulation ...
Man-in-the-Disk Attack Lets Hackers Bypass Android App Sandbox Security

Man-in-the-Disk Attack Lets Hackers Bypass Android App Sandbox Security

Researchers have devised a new attack technique that takes advantage of how apps use the external storage of Android devices to store files to bypass security restrictions.Under the Android security model each application runs inside a sandbox, which means other applications can’t access to its internal files and secrets. However, apps ...
You may also like

Be sure to check Security Boulevard daily for the latest in security news, updates and features worth noting.

Featured eBook
Mastering Machine Learning for Security Professionals

Mastering Machine Learning for Security Professionals

Some may disagree with that statement. “Machine learning isn’t “ready,” they’ll say. “Machine learning can’t replace human analysis, they’ll say. The technology is still maturing—those who are trying to teach the learning machines grapple with what actually works and how, and some early results have been so disappointing that security researchers are inclined to believe ... Read More
Security Boulevard
Saleem Padani

Saleem Padani

Saleem is a highly accomplished business, marketing and technology leader with track-record of success in startups, mid-size and large technology and professional services organizations, currently the COO at MediaOps, Worldwide Program Director & Technical Evangelist at IBM, Director of Industry Solutions at Neuvis, Co-founder & Vice President of LexiBridge and Senior Software Architect at DataEase International. Saleem has passion for leading and empowering global teams to drive new initiatives, leveraging broad & deep business, strategic, marketing, technical and solution delivery skills. Saleem has an Executive M.B.A, from University of Texas at Dallas, Master’s and Bachelor’s Degree in Computer Engineering.

saleem has 22 posts and counting.See all posts by saleem