Cybersecurity

Permissionless data slurping: Why Google’s latest bombshell matters • The Register

https://www.theregister.co.uk/2017/11/22/permissionless_data_slurping_google/ Somebody else than just your mobile operator gets to know where you are: According to an old Chinese proverb: “When a wise man points at the Moon, an idiot looks at his finger.” Google may have been hoping that you were examining a finger, not reading a Quartz story yesterday, which reveals how Android phones send

No, you’re not being paranoid. Sites really are watching your every move | Ars Technica

https://arstechnica.com/tech-policy/2017/11/an-alarming-number-of-sites-employ-privacy-invading-session-replay-scripts/ If you have the uncomfortable sense someone is looking over your shoulder as you surf the Web, you’re not being paranoid. A new study finds hundreds of sites—including microsoft.com, adobe.com, and godaddy.com—employ scripts that record visitors’ keystrokes, mouse movements, and scrolling behavior in real time…

Getting Started with IoT Security with Threat Modeling

https://www.denimgroup.com/resources/blog/2017/11/getting-started-with-iot-security-with-threat-modeling/?lipi=urn%3Ali%3Apage%3Ad_flagship3_pulse_read%3BtGhVz%2BNYQRiSgJC%2Bt%2FEWQQ%3D%3D The security of IoT systems can be exceptionally complex because of the large number of components, potentially extensive attack surface, and the interactions between different parts of the system. Threat modeling is a great starting point to understand the risks associated with IoT systems. The challenge with this trend is that IoT devices are just computers

Containers and microservices complicate cloud-native security

http://www.theserverside.com/feature/Containers-and-microservices-complicate-cloud-native-security?utm_campaign=Black%20Duck%20Press&utm_content=60709505&utm_medium=social&utm_source=facebook Developing applications with microservices and containers may be a modern approach to software design, but traditional software flaws still remain a problem when addressing cloud-native security. When you think about microservices-architected, there’s a wide range of, I guess you could say opinions, about what that means.  In this age of DevOps and cloud-native development, the software

Gas station runs Windows

What is technology inside gas station where you just put in credit card and fill the tank yourself. I has already taken a look at one Verifone payment terminal on what software it runs (it runs Linux). Today I got a view of what is technology used on similar device made by Dresser Wayne AB.

Man With Machine: Harnessing the Potential of Artificial Intelligence

https://securityintelligence.com/man-with-machine-harnessing-the-potential-of-artificial-intelligence/?cm_mmc=PSocial_Facebook-_-Security_Detect%20threats%20-%20QRadar-_-WW_WW-_-23012462_Tracking%20Pixel&cm_mmca1=000017NK&cm_mmca2=10004134&cm_mmca4=23012462&cm_mmca5=48989195&cm_mmca6=bdfe5818-7fea-4ba1-a728-fef91b396b4d&cvosrc=social%20network%20paid.facebook.WW%20Newsfeed%20Job%20Title%20CISO%20Discover%20SI%20Blog%20Engagement%20SI%20Watson%20Man%20With%20Machine%20AI%20Watson1%20_SD%20Behav_DesktopMobile%20Tablet_1x1&cvo_campaign=000017NK&cvo_pid=23012462  When we think of artificial intelligence (AI), we think of robots — machines that mimic human behavior or thought. This is partly the influence of comics, novels, movies and other pop culture tidbits, but the boundaries of AI have progressed far beyond this basic personification.  At its most basic level, machine learning, a subset of