Cybersecurity

Friday Fun: 2021 Information security in memes

Remember the most interesting events of the information security industry in 2021 in memes and tweets and fairy tales. 2021 Information security in memes and tweets https://www.kaspersky.com/blog/security-2021-year-in-memes/43237/ Hans Christian Andersen on security technologies https://www.kaspersky.com/blog/andersen-cybersecurity-technologies/43232/

Cyber security trends for 2022

Nothing is more difficult than making predictions. Instead of trowing out wild ideas what might be coming, I have collected here some trends other people have predicted or reported. Why the Future Needs Passwordless Authentication https://securityintelligence.com/future-needs-passwordless-authentication/ As of September, Microsoft users no longer have to rely on passwords when logging in to their accounts. Passwords

Max Headroom signal hijacking

Happy Max Headroom signal hijacking day!! https://en.m.wikipedia.org/wiki/Max_Headroom_signal_hijacking The Max Headroom signal hijacking occurred on the night of November 22, 1987, when the television broadcasts of two stations in Chicago, Illinois, United States, were hijacked in an act of broadcast piracy by a video of an unidentified person wearing a Max Headroom mask and costume. According

Dynamic random flip memory

Row hammer (also written as rowhammer) is a security exploit that takes advantage of an unintended and undesirable side effect in dynamic random-access memory (DRAM) in which memory cells interact electrically between themselves by leaking their charges, possibly changing the contents of nearby memory rows that were not addressed in the original memory access. The

Hardware Weaknesses of 2021

First CWE Security Report Highlights the “Most Important Hardware Weaknesses” of 2021 has been released. “The goals for the 2021 Hardware List are to drive awareness of common hardware weaknesses through CWE, and to prevent hardware security issues at the source by educating designers and programmers on how to eliminate important mistakes early in the

Braktooth breaks Bluetooth

The United States Cybersecurity and Infrastructure Security Agency (CISA) warned last week on proof-of-concept (PoC) code for the BrakTooth Bluetooth vulnerabilities now being publicly available. BrakTooth is the name researchers with the Singapore University of Technology and Design gave to a set of roughly two dozen vulnerabilities in commercial Bluetooth Classic (BT) stacks and which