- Vulnerability Scanners Turn Up Mostly False Positives - AHHHHHHHHHHHHHHHHHHH!!!!!!!
- Ironic: CCTV systems slide open a backdoor into your biz network - Okay, yea we knew this. What do we DO about it?
- Surprise! You have mystery PCs - We’ll have to set up a special system that only does network scanning and let it run until it finishes — probably a few months to scan every IP address. Uhm, there are better ways to accomplish this.
- Attackers Packing Malware Into Powershell - Yup, we've known about this for a while.
- Threat Intelligence's Big Data Problem - Threat Intelligence and big data, go buzzwords!
- "Even Sex Toys Aren’t Safe From Hackers - Okay, but what is the risk of hacking sex toys?
- It is time to prioritize security for Internet of Things and wearables
- Hotel light control hack illuminates lamentable state of IoT security - I love how they tied the IP address to the room number! A cunning p
- Amazon goes after patent so you can pay by selfie - Facial recognition to pay for stuf
f? Will it work?
- LinkedIn Being Used To Prime Phishing Targets - Well, yea, we've done it for years.
- One of the Celebgate hackers pleads guilty to phishing iCloud and Google logins - Yea, usually its not even this sophisticated.
- Home Depot To Pay $19.5 Million In Data Breach Settlement - Do you thi
nk this really hurt Home Depot?
- "Safari - Things got hacked, software is vulnerable. The end.
- "SSH Honeypots (Ab)used as Proxy - Honeypots are great, but you have to monitor them closely and be certain they
are not being abused. This is a neat little hack.
- Defence In Depth For Web Applications - Look defending web applications, or even software applications, is hard. However, the pro
cess is well-defined: 1) Before you write software do threat modeling 2) Train developers on security 3) developers do static analysis 4) QA does dynamic scanning 5) security teams implement a RASP.