Cybersecurity

Your computer can leak data in many ways

Here is some interesting information on leaking information from air-gapped computers. Most methods shown here use computer power supply to leak some pieces of information. But there are also some other methods shown. A researcher from Israel described a new method to covertly steal highly sensitive data from air-gapped computers using power supply units. Dubbed

Cyber Security News May 2020

This posting is here to collect cyber security news in May 2020. I post links to security vulnerability news with short descriptions to comments section of this article. If you are interested in cyber security trends, read my Cyber security trends 2020 posting. You are also free to post related links to comments.

Cyber Security News April 2020

This posting is here to collect cyber security news in April 2020. I post links to security vulnerability news with short descriptions to comments section of this article. If you are interested in cyber security trends, read my Cyber security trends 2020 posting. You are also free to post related links to comments.

Intel hardware trust is lost again?

Yet another bad sounding Intel processor security vulnerability is released and this could be big again. Little over two years ago I wrote about Meltdown and Spectre, and posted links to some following vulnerabilities. Now an article Intel x86 Root of Trust: loss of trust from Positive Technologies details a new vulnerability. Researchers at enterprise

Nasty Linux PPPD vulnerability

This looks like a nasty vulnerability. It seems that a newly found critical 17-years-old remote code execution (RCE) vulnerability could open nearly all popular #Linux based operating systems and many embedded devices to remote hackers. Many widely-used Linux distributions have already been confirmed impacted. Hacker news writes: The US-CERT today issued advisory warning users of

Cyber security news March 2020

This posting is here to collect cyber security news in March 2020. I post links to security vulnerability news with short descriptions to comments section of this article. If you are interested in cyber security trends, read my Cyber security trends 2020 posting. You are also free to post related links to comments.

Biggest mobile app failures this week

This week there has been news on problems with high profile mobile apps for politics and aviation. Iowa has already won the worst IT rollout award of 2020: Rap for crap caucus app chaps in vote zap flap Untested tech, no training, last-minute rollout, buggy code – sound familiar? https://www.theregister.co.uk/2020/02/04/iowa_caucus_software/ ‘We Feel Really Terrible,’ Says

Cyber security news February 2020

This posting is here to collect cyber security news in February 2020. I post links to security vulnerability news with short descriptions to comments section of this article. If you are interested in cyber security trends, read my Cyber security trends 2020 posting. You are also free to post related links to comments.

SDR videos

Software-defined radio (SDR) technology can be used for many interesting technical experiments. With listening only SDR you can do many interesting things, but having a SDR that can also transmit opens many new doors. Here are some interesting videos related to SDR and cyber security: Universal Radio Hacker – Replay Attack With HackRF Download here:

Cyber security news January 2020

This posting is here to collect cyber security news in January 2020. I post links to security vulnerability news to comments of this article. If you are interested in cyber security trends, read my Cyber security trends 2020 posting. You are also free to post related links to comments.