From Security Weekly Wiki
Jump to navigationJump to search
  1. US-CERT Warns of Remotely Exploitable Bugs in Medical Devices
  2. DLL Hijacking Flaw Impacts Symantec Endpoint Protection | SecurityWeek.Com
  3. New MITRE Foundation Aims to Boost Critical Infrastructure | SecurityWeek.Com
  4. Company Detected Years-Long Breach Only After Hacker Maxed Out Servers' Storage - They need visibility into better indicators of compromise, disk space too low is way too slow: The company discovered the breach on March 7, 2016, when it began receiving alerts that one of its servers had reached its maximum capacity, which was due to a massive data archive file that the hacker created on its customers. Surprisingly, the intruder managed to breach the company at least two more times even after InfoTrax Systems became aware of the intrusion.
  5. Network complexity and lack of visibility contribute to misconfigurations and increased risk - Help Net Security
  6. Intel CPUs From Haswell to Cascade Lake Vulnerable to Zombieload V2
  7. Vulnerability in McAfee Antivirus Products Allows DLL Hijacking | SecurityWeek.Com
  8. Memes could be our secret weapon against pesky bots - This actually has meritt: They propose memes could be "one of the strongest techniques to distinguish between a human and a bot based on conscience and interpretation." After all, bots don't get cultural references and online humor the way humans do, the authors argue. I fondly remember "Data" (Star Trek: The Next Generation character for you non-trekkies) trying to understand humor, we all thought it was funny, but all the jokes were lost on poor Data.
  9. Intel Driver Vulnerability Can Give Attackers Deep Access to a Device | SecurityWeek.Com
  10. No, YouTube isn't planning to jettison your unprofitable channel - But they are giving themselves as much power as they can to terminate a channel for any reason, unprofitable could be just one thing. The point is, they don't need a reason. If they don't like content for whatever reason, offensive, political agenda conflict, they can just disable or delete your channel and you have very little recourse. How do I know this? First-hand experiences...(Yes, plural).
  11. Project Nightingale: Google accesses trove of US patient data
  12. The five pillars of cyber security
  13. Are we living in a Blade Runner world? - This is just a really poor analogy: And we don’t need the Voight-Kampff test yet, but how many times have you been asked to mark all the traffic lights on a grid picture to prove you’re not a robot, and gain access to a website?