Cybersecurity

Cyber security news September 2020

This posting is here to collect cyber security news September 2020. I post links to security vulnerability news with short descriptions to comments section of this article. If you are interested in cyber security trends, read my Cyber security trends 2020 posting. You are also free to post related links to comments.

Stingray and Hailstorm

Security researchers say they have developed a new technique to detect modern cell-site simulators. Little is known about stingrays that exploit flaws in the way that cell phones connect to 2G cell networks, because they are deliberately shrouded in secrecy. Most of those flaws are fixed in the 4G networks, though not all. Newer cell

Cyber security news August 2020

This posting is here to collect cyber security news in August 2020. I post links to security vulnerability news with short descriptions to comments section of this article. If you are interested in cyber security trends, read my Cyber security trends 2020 posting. You are also free to post related links to comments.

Cyber-attacks to power utility

Cyberattacks targeting a local power utility or end-user systems could propagate to the national bulk-power system and affect millions of people. We know that terrorists and state-sponsored actors already have the capabilities to disrupt a country’s power supply. The human costs of power-supply disruptions can go far beyond inconvenience. On 1 May, Donald Trump signed

Cyber security news July 2020

This posting is here to collect cyber security news in July 2020. I post links to security vulnerability news with short descriptions to comments section of this article. If you are interested in cyber security trends, read my Cyber security trends 2020 posting. You are also free to post related links to comments.

Change of computing terms?

ZDnet reports at https://www.zdnet.com/article/github-to-replace-master-with-alternative-term-to-avoid-slavery-references/ that a number of people and companies plan to drop terms like “master” and “slave” for alternatives like “main/default/primary” and “secondary;” but also terms like “blacklist” and “whitelist” for “allow list” and “deny/exclude list.” ZDNet found that projects like the OpenSSL encryption software library, automation software Ansible, Microsoft’s PowerShell scripting language,

Cyber security news June 2020

This posting is here to collect cyber security news in June 2020. I post links to security vulnerability news with short descriptions to comments section of this article. If you are interested in cyber security trends, read my Cyber security trends 2020 posting. You are also free to post related links to comments.

Uusiteknologia 1/2020 magazine published

Uusiteknologia.fi is a Finnish language electronics and technology professionals magazine published on-line. In the newest issue have written articles on many high tech topics (text in Finnish with short introduction in English). Earlier issues have been published as an electronic magazine that looks like a regular printed magazine, but this newest issue is published in

Your computer can leak data in many ways

Here is some interesting information on leaking information from air-gapped computers. Most methods shown here use computer power supply to leak some pieces of information. But there are also some other methods shown. A researcher from Israel described a new method to covertly steal highly sensitive data from air-gapped computers using power supply units. Dubbed

Cyber Security News May 2020

This posting is here to collect cyber security news in May 2020. I post links to security vulnerability news with short descriptions to comments section of this article. If you are interested in cyber security trends, read my Cyber security trends 2020 posting. You are also free to post related links to comments.