Changes

From Security Weekly Wiki
Jump to navigationJump to search
no edit summary
{{Template:LeeNeely}}
{{Template:Patrick}}
{{Template:TylerR}}
{{Template:Joff}}
<br><br>
<!-- <center>{{#ev:youtube|iPHM80z9D9k}}</center>-->
= Tech Segment: Adventures In AWS Computing - 6:45PM-7:30PM =
<!-- [[File:AmbujKumar.jpg|right|250px|thumb|<center>'''[https://twitter.com/ambuj0 Ambuj Kumar]'''is the CEO & co-founder of [https://fortanix.com/ Fortanix].</center>]] -->
== Paul's Stories ==
{{Template:PSWPaul637PSWPaul638}}
== LarryPatrick's Stories ==#[https://www.propublica.org/article/the-iowa-caucuses-app-had-another-problem-it-could-have-been-hacked No way! The Iowa election results web app is hackable! Who could have guessed?] While there is no evidence hackers intercepted or tampered with the results, Veracode found that the app lacks key safeguards.
== Jeff's Stories ==
#[https://www.nytimes.com/interactive/2020/01/29/climate/kryptos-sculpture-final-clue.html This Sculpture Holds a Decades-Old C.I.A. Mystery. And Now, Another Clue.]
#[https://www.wired.com/2013/07/nsa-cracked-kryptos-before-cia/ Documents Reveal How the NSA Cracked the Kryptos Sculpture Years Before the CIA]
#[https://www.bloomberg.com/amp/news/articles/2020-02-05/ransomware-attack-on-hospital-shows-risk-for-muni-bond-issuers? Ransomware Attack on Hospital Shows New Risk for Muni-Bond Issuers]
#[https://threatpost.com/critical-cisco-cdpwn-flaws-network-segmentation/152546/ Critical Cisco ‘CDPwn’ Flaws Break Network Segmentation]
#[https://www.cnet.com/news/facebook-urged-to-halt-encryption-push-over-child-abuse-concerns/ Facebook urged to halt encryption push over child abuse concerns]
== Lee's Stories ==
#[https://www.infosecurity-magazine.com/news/twitter-fixes-api-bug-that/ Twitter fixes API bug] Bug in API that could be used to reveal users by matching names and phone numberes, if they have the "let people who have your phone number find you on Twitter" setting on.
#[https://techerati.com/news-hub/microsoft-azure-cyber-security-flaws-patches-azure-stack-cse20-2020/ Microsoft patches flaws in Azure stack] CVE-2019-1372, a high risk vulnerability as it allows RCE as system & CFE-201-1234, a low risk vulnerability.
#[https://www.businessinsider.in/international/news/8-cities-that-have-been-crippled-by-cyberattacks-and-what-they-did-to-fight-them/articleshow/73622108.cms 8 cities that have been crippled by Cyberattacks and what they did to fight them] Here is how attacks on Atlanta, Baltimore, St. Lucie, New Bedford, New Orleans, Greenville, PensicolaPensacola, and Wilmer were handled them.#[https://www.independent.co.uk/life-style/gadgets-and-tech/news/philips-hue-smart-light-bulb-hack-cyber-security-a9317456.html Hackers Can Hijack Your House Through Your Lightbulb, Researchers Warn] ZigBee flaw permits Philips Hue lightbulb takeover. Low risk, CVE-2020-6007 patch available from Phillips. [https://blog.checkpoint.com/2020/02/05/the-dark-side-of-smart-lighting-check-point-research-shows-how-business-and-home-networks-can-be-hacked-from-a-lightbulb/ Report from Check Point]#[https://news.yahoo.com/5-router-settings-keep-hackers-100002475.html 5 router settings to keep hackers off your cameras, smart speakers and network] Some basic settings that help raise the bar on home network security. See also Joff's Blog [https://www.blackhillsinfosec.com/10-ways-to-protect-your-online-digital-life/ 10 Ways to Protect Your Online Digital Life - Black Hills Information Security] #[https://www.securityweek.com/researcher-finds-over-60-vulnerabilities-physical-security-systems Reaearcher finds over 60 vulnerabilities in Physical Security systems] Researcher Joachim Kerschbaumer identified 60 vulnerabilities across 20 physical security products, including flaws that allow takeover.
== Tyler's Stories ==
#[https://thehackernews.com/2020/02/hacking-air-gapped-computers.html Hacking Air Gapped Computers]
#[https://www.theatlantic.com/magazine/archive/2020/03/the-2020-disinformation-war/605530/ The 2020 Disinformation War]
#[https://www.bleepingcomputer.com/news/security/charming-kitten-hackers-impersonate-journalist-in-phishing-attacks/ Charming Kitten Hackers Impersonate Journalist in Phishing Attacks]
#[https://threatpost.com/community-housing-nonprofit-bec-scam/152563/ Community Housing Nonprofit Hit with $1.2M Loss in BEC Scam]
#[https://blog.huntresslabs.com/adversary-exposed-how-one-criminal-attempted-to-sell-an-msp-on-the-dark-web-d707a5464669 Adversary Exposed How One Criminal Attempted to Sell an Msp on the Dark WEb]
#[https://thehackernews.com/2020/02/hack-whatsapp-web.html?m=1 Hack WhatsApp]
#[https://medium.com/@trademarkmaldives/facebook-gets-patent-to-track-users-television-viewing-c536bcc35389 Facebook Gets Patent to Track Users' Television Viewing]
#[https://apple.news/AGnicfnHSTCePo62Tw6MMqg Hackers took over Twitter accounts for the NFL and a bunch of teams, including Super Bowl contenders 49ers and Chiefs]
#[https://www.stripes.com/news/hacking-leads-to-fake-story-claiming-us-soldier-in-lithuania-has-coronavirus-1.617404 Hacking Leads to Fake Story Claiming US Soldier in Lithuania Has CoronaVirus]
#[https://www.theverge.com/2020/2/4/21122044/google-photos-privacy-breach-takeout-data-video-strangers Google admits it sent private videos in Google Photos to strangers]
#[https://www.bloomberg.com/news/articles/2020-02-03/iowa-precinct-chairs-report-struggles-with-caucus-phone-app Iowa Precinct Chair Reports Stuggles with Caucus Phone App]
#[https://www.zdnet.com/article/twitter-says-an-attacker-used-its-api-to-match-usernames-to-phone-numbers/ Twitter Says an Attacker Used its API to Match Usernames to Phone Numbers]
#[https://archive.md/IY71v Ex-CIA Engineer Goes on Trial for Massive Leak]
#[https://www.wsj.com/articles/ex-cia-engineer-goes-on-trial-for-massive-leak-11580741119 Ex-CIA Engineer Goes on Trial for Massive Leak]
#[https://www.securityweek.com/graduation-day-cyber-threat-intelligence-intelligence Graduation Day Cyber Threat Intelligence Intelligence]
#[https://blog.erratasec.com/2020/01/theres-no-evidence-saudis-hacked-jeff.html#.XjgIsCN7mM8 There's No Evidence Saudis Hacked Jeff]
#[https://www-cnbc-com.cdn.ampproject.org/c/s/www.cnbc.com/amp/2020/01/31/ashley-madison-breach-from-2015-being-used-in-sextortion-scams.html Ashley Madison Breach from 2015 Being Used in Sextortion Scams]
#[https://www.wsj.com/articles/where-computing-is-headedbeyond-quantum-11580837001 Where Computing is Headed Beyond Quantum]
#[https://www.armis.com/cdpwn/ 5 Zero-day Vunlerabilities in Cisco Discovery Protocol Impacting Tens of Millions of Devices]
== Joff's Stories ==
#[https://www.blackhillsinfosec.com/10-ways-to-protect-your-online-digital-life/ 10 Ways to Protect Your Online Digital Life - Black Hills Information Security] Basic advice in human terms to secure your online digital life.
<br>
{{SocialMedia}}
346

edits

Navigation menu