Security Boulevard’s 5 Most Read Stories for the Week, August 13-17

A new week, a new crop of security stories. Last week, lack of user privacy, man-in-the-attack, dumb privacy rules and Intel CPUs vulnerabilities made the headlines. In addition, we discussed how to get smarter about securing smart technologies.

Man-in-the-Disk Attack Lets Hackers Bypass Android App Sandbox Security

Man-in-the-Disk Attack Lets Hackers Bypass Android App Sandbox Security

Researchers have devised a new attack technique that takes advantage of how apps use the external storage of Android devices to store files to bypass security restrictions.Under the Android security model each application runs inside a sandbox, which means other applications can’t access to its internal files and secrets. However, apps ...
User Privacy Threatens Security Defenses

Lack of User Privacy Threatens Security Defenses

Data threats come from three general fronts: individuals sharing too much information, data breaches and corporations selling increasingly granular customer data. Security professionals frequently sound warnings for the first two. The last one is rarely acknowledged as a security threat and more commonly labelled a privacy issue. But security and ...
Dark Side Quantum Computing

New Foreshadow Vulnerabilities Defeat Memory Defenses on Intel CPUs

Security researchers have uncovered a new way to exploit the speculative execution feature of Intel CPUs to bypass memory security barriers and leak protected information.The vulnerability, known as Foreshadow or L1 Terminal Fault (L1TF), has three variants. The original variant was discovered by a team of researchers from KU Leuven ...
internet of things security

The Internet of Things: Getting Smarter about Securing Smart Technologies

The Internet of Things: Getting Smarter about Securing Smart Technologies Scott Carter Wed, 08/15/2018 - 19:13 Machine identities are not being secured in the same way as human identities online, resulting in a lack of encryption across networks, among other things. When two machines can talk without encryption, or are ...

Dumb Privacy Rules: How Lawyers are Ruining It for Everyone

Father Guido Sarducci, comedian Don Novello’s eccumenical doppleganger, had a routine where he discussed the idea of the “5-minute University,” where he would teach you in five minutes everything you would remember about college five years after graduating (Economics? Supply and Demand). Sometimes it pays to reduce a law, regulation ...
You may also like

Be sure to check Security Boulevard daily for the latest in security news, updates and features worth noting.

Featured eBook
Open Source Security: Weighing the Pros and Cons

Open Source Security: Weighing the Pros and Cons

Over the past few years, open source has grown in popularity, especially among developers using open source code in their application development efforts. Open source software offers incredible benefits to enterprises IT and development efforts. Free, available software libraries mean cost savings, easy customization, speed, agility and flexibility for development and IT teams. There are ... Read More
Security Boulevard
Saleem Padani

Saleem Padani

Saleem is a highly accomplished business, marketing and technology leader with track-record of success in startups, mid-size and large technology and professional services organizations, currently the COO at MediaOps, Worldwide Program Director & Technical Evangelist at IBM, Director of Industry Solutions at Neuvis, Co-founder & Vice President of LexiBridge and Senior Software Architect at DataEase International. Saleem has passion for leading and empowering global teams to drive new initiatives, leveraging broad & deep business, strategic, marketing, technical and solution delivery skills. Saleem has an Executive M.B.A, from University of Texas at Dallas, Master’s and Bachelor’s Degree in Computer Engineering.

saleem has 22 posts and counting.See all posts by saleem