Week in review
Week in review: SLOTH attacks, JavaScript-based ransomware, and hacking medical implants
Here’s an overview of some of last week’s most interesting news and articles: SLOTH attacks weaken secure protocols because they still use MD5 and SHA-1 …
Week in review: ScreenOS backdoor, Twitter warns about state-sponsored attacks, and MacKeeper data breach
Here’s an overview of some of last week’s most interesting news and articles: Critical ScreenOS bugs allow undetectable decryption of VPN connections, device …
Week in review: Information the FBI can collect with NSLs revealed, VPN protocol flaw gives away users’ true IP address
Here’s an overview of some of last week’s most interesting news and articles:Human element of security to the fore at IRISSCON 2015Training people to take more …
Week in review: Dell computers shipped with root CA cert and private key, analytics services tracking users via Chrome extensions
Here’s an overview of some of last week’s most interesting news and articles:Four ways an attacker can infiltrate an organization by diverting security …
Week in review: Mainframe security, cross-device tracking, and how online fraud will evolve in 2016
Here’s an overview of some of last week’s most interesting news, interviews and articles:Android adware tricks users into giving it power to secretly download …
Week in review: Linux ransomware, university researchers unmask Tor users, and how one man changed the way we understand SSL
Here’s an overview of some of last week’s most interesting news and articles:Ivan Ristic and SSL Labs: How one man changed the way we understand SSL“When I …
Week in review: DDoS attack on ProtonMail, 0-days found in Samsung Galaxy S6 Edge
Here’s an overview of some of last week’s most interesting news, interviews and articles:Surviving in the IoT world: Risks of smart home devicesInvestigating some …
Week in review: WhatsApp data collection, roadblocks to implementing CISA, and how US law enforcement uses Stingrays
Here’s an overview of some of last week’s most interesting news and articles:European Parliament members want member states to protect Edward SnowdenToo little has …
Week in review: Criminals hacked chip-and-PIN system, secret code in printers allows tracking, and insecure WD self-encrypting hard drives
Here’s an overview of some of last week’s most interesting news and articles:Criminals hacked chip-and-PIN system by perfecting researchers’ PoC attackWhen …
Week in review: WiFi jamming, Flash zero-day actively exploited, and abusing the Internet of Things
Here’s an overview of some of last week’s most interesting news and articles:WiFi jamming attacks more simple and cheaper than everA security researcher has …
Week in review: The price of the Internet of Things, YiSpecter hits non-jailbroken iOS devices, and the most secure Android smartphones
Here’s an overview of some of last week’s most interesting news and articles:The price of the Internet of Things will be a vague dread of a malicious …
Week in review: The evolution of the CISO, a simple Gatekeeper bypass, and Stagefright 2.0
Here’s an overview of some of last week’s most interesting news and articles:Leaked Hacking Team emails show Saudi Arabia wanted to buy the companyEmails stolen in …
Featured news
Resources
Don't miss
- Mirai botnet behind the largest DDoS attack to date
- 48,000+ internet-facing Fortinet firewalls still open to attack
- Acronis CISO on why backup strategies fail and how to make them resilient
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving