The Five Most Dangerous New Attack Techniques and How to Counter Them

5 Emerging Vectors of Attack and Recommendations for Mitigating the Risks

DNS manipulation, domain fronting, targeted cloud individual attacks, HTTPS and encryption, and the exploitation of hardware features are among the emerging challenges adversaries can exploit according to cybersecurity experts at SANS ...
Navigation Apps: Leading the Way? Or Following You?

Navigation Apps: Leading the Way? Or Following You?

In the United States alone, 84% of adults are using navigation applications, according to a recent Gallup poll. Whether they’re downloading it in an app store or the navigation capability is already ...
 via wehatetowaste.com, original photo credit: Living Green Magazine

Rothman’s Data Security Reset, What To Target And Protect

via wehatetowaste.com, original photo credit: Living Green Magazine via the inimitable Mike Rothman, comes this tour de force research effort targeting of all things - Data Security. In which, the Securosis organization ...
Browser Cookie Jar: The Pilferage

Browser Cookie Jar: The Pilferage

via Cory Doctorow, comes this fascinating stoy of academicians exercising superlative research and detection skills in the effort to understand - in excrutiatingly intense detail - the true nature of cookie policies, ...
Foreshadow Attack

The Foreshadow Attack: Intel On The Ropes

Is Intel Corporation (Nasdaq:INTC) Down and Out, or Just Down? As always you be the judge... Permalink ...
 via the   White Paper   mentioned herein.

Alejandro Hernandez’s Exposing Security Weakness in Stock Trading Tech

via the White Paper mentioned herein. Superlative security research is still coming out of the IOActive game-changing environment (this has been going on for years now - how do they do it...) ...
flirred.jpg

The Next Battleground

via Rob Knake, writing at the Council on Foreign Relations' online outlet: Foreign Affairs and in the Snapshot section, comes this astute examination of the co-called cyberwarfare space's soft underbelly - power ...
   via   the Security Mindset of   Robert M. Lee   and Illustration talents of   Jeff Hass   at   Little Bobby   Comics

Robert M. Lee and Jeff Hass’ Little Bobby Comics – ‘Different Hats’

via the Security Mindset of Robert M. Lee and Illustration talents of Jeff Hass at Little Bobby Comics Permalink ...

Appthority Discovers Thousands of Apps with Firebase Vulnerability Exposing Sensitive Data

Appthority has discovered a significant mobile data vulnerability related to Google Firebase which has resulted in the exposure of a wide range and large amounts of sensitive data through thousands of mobile ...
Loading...