Cybersecurity

China Spying on Undersea Internet Cables – Schneier on Security

https://www.schneier.com/blog/archives/2019/04/china_spying_on.html It seems that supply chain security is an insurmountably hard problem in Internet age. For years, the US and the Five Eyes seems to have had a monopoly on spying on the Internet around the globe. Now other countries seem to want in too. The recent focus on cyber security discussion has been a

Update Putty

PuTTY is one of most used open-source client-side programs to remotely access computers over secure SSH network protocol from Windows workstations. I use it very often to connect to embedded Linux devices and Linux servers. Based on latest news it might be now a very good idea to update it to latest version 0.71: PuTTY

New Tech Secures Medical Devices By Using Your Body as a Conduit for Communication

https://blog.hackster.io/new-tech-secures-medical-devices-by-using-your-body-as-a-conduit-for-communication-8ca7b8128f67 The article says: “Virtually all wearable devices today communicate wirelessly through either Bluetooth, WiFi, or simple RF (Radio Frequency) signals. While we could try to make those more secure, there is always the possibility that they could be intercepted or spoofed. This new technology avoids the problem altogether by allowing devices to communicate across

Linux kernel 5.0 released

https://www.cyberciti.biz/linux-news/linux-kernel-5-0-released-how-to-install/ Linus Torvalds the creator and the principal developer of the Linux kernel announced the release of Linux kernel version 5.0. This release increases the major kernel version number to 5. from 4.x. There are not any major changed in features but still normal set of changes you can expect from version to another. On

Cyber Security March 2019

This posting is here to collect cyber security news in March 2019. I post links to security vulnerability news to comments of this article. If you are interested in cyber security trends, read my Cyber security trends 2019 posting. You are also free to post related links.

Breaking out of Docker via runC – Explaining CVE-2019-5736 | Twistlock

https://www.twistlock.com/labs-blog/breaking-docker-via-runc-explaining-cve-2019-5736/ More than a week ago (2019-02-11) a new vulnerability in runC was reported by its maintainers. Dubbed CVE-2019-5736, it affects Docker containers running in default settings and can be used by an attacker to gain root-level access on the host. The same fundamental flaw exists in LXC. Both runC and LXC were patched and

Cyber Security News February 2019

This posting is here to collect cyber security news in February 2019. I post links to security vulnerability news to comments of this article. If you are interested in cyber security trends, read my Cyber security trends 2019 posting. You are also free to post related links.  

Cheap Internet of Things gadgets betray you even after you toss them in the trash

https://techcrunch.com/2019/01/30/cheap-internet-of-things-gadgets-betray-you-even-after-you-toss-them-in-the-trash/ You may think that the worst you’ll risk by buying a bargain-bin smart bulb or security camera will be a bit of extra trouble setting it up or a lack of settings. When plugged in many of those cheap gadgets are a security risk. But even when they are thrown to the garbage can,

Cyber breaches abound in 2019

Cyber breaches abound in 2019 https://techcrunch.com/2018/12/26/cyber-breaches-abound-in-2019/ News of high-profile cyber breaches has been uncharacteristically subdued in recent quarters. Is this a harbinger of a worse hacking landscape in 2019? The answer is unequivocally yes. No question, cyber breaches have been a gigantic thorn in the global economy for years. But expect them to be even