New DNS Hijacking Attacks

DNS hijacking isn't new, but this seems to be an attack of unprecedented scale: Researchers at Cisco's Talos security division on Wednesday revealed that a hacker group it's calling Sea Turtle carried ...
Radware's 2019 Hacker's Almanac

Here’s How You Can Better Mitigate a Cyberattack

Where does the attack landscape lead us into 2020? No one knows for sure, but strong indicators help Radware build logic chains to better forecast where the state of network security is ...
Can You Crack the Hack?

Can You Crack the Hack?

Let’s play a game. Below are clues describing a specific type of cyberattack; can you guess what it is? This cyberattack is an automated bot-based attack It uses automation tools such as ...
Hardware Hacking 101 - Lesson 3: Abusing UART (U Are RooT)

Hardware Hacking 101 – Lesson 3: Abusing UART (U Are RooT)

As a reminder, Lesson 1 was a primer on electronics and setting up your lab, and Lesson 2 was an introduction to classical hardware hacking. To get started with security-focused hardware hacking, ...
Out of the Shadows, Into the Network

Out of the Shadows, Into the Network

Network security is a priority for every carrier worldwide. Investments in human resources and technology solutions to combat attacks are a significant part of carriers’ network operating budgets. The goal is to ...
Heart attack

Implanted Medical Devices Can Be Hacked Wirelessly, Warns U.S. Gov’t

Implantable cardioverter defibrillators (ICDs) made by Medtronic are insecure, says the Dept. of Homeland Security. Exploitation is trivial, possible outcomes include the death of the patient. And Medtronic knew about the problem ...
Security Boulevard
Assessing next-generation protection

Assessing next-generation protection

Malware scanning is not enough. You have to hack, too. Latest report now online. The amount of choice when trialling or buying endpoint security is at an all-time high. It has been ...

The Many Flavors of Linux

| | Hacking
Linux is not as popularly used in both the security- and user-focused computing worlds as other OSes such as Windows and macOS, but it can still be used for both. In fact, ...
Polar bear

Ransomware Fighter Lives in Fear for his Life

This hacker hacks the hackers. He reverse-engineers ransomware so that victims can decrypt their files without paying money to criminals. But the polar bear-loving Fabian Wosar lives in hiding at an undisclosed location ...
Security Boulevard

Conferences

| | Hacking
Here are the following events Infosec will be at this year. NCSA Cybersecure My Business March 25, 2019 | San Jose, CA LendIT FinTech – Booth 1310 April 8-9, 2019 | San ...
Loading...