Researchers at Bitdefender say that they have uncovered two vulnerabilities in low cost Chinese cameras. One of the cameras is used in the iDoorbell – which represents a software supply chain issue on top of it. The cameras come from Shenzen Neo Electronics. Researchers suspect that other cameras are affected as well. Using the search […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
General Keith Alexander, former director of the National Security Agency, said that cyber espionage is the greatest transfer of wealth in history. In 2012 when he made that statement, the the value of cyber industrial espionage on an annual basis was $338 billion. Per year. 5 years later I am sure that number is greater. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Business email compromise (BEC) attacks are relentlessly attacking businesses with no let-up in sight. BEC attacks have traditionally used CEOs and CFOs as their foils, pretending to be them and getting people to wire money to the hackers. The oil and gas industry was targeted by a single individual using old generic malware readily […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A report presented this month at the 2017 Usenix Workshop on Offensive Technologies was pretty offensive – and not in the way they meant in the workshop title. Offensive security is what spies do – go out and attack a system. The report demonstrated a proof of concept attack that would work if someone took […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In the ongoing Wikileaks Vault 7 series of leaks, there is a new leak called ExpressLane. According to the documents released by Wikileaks, the CIA offers a partnership with other law enforcement and government agencies in which those partners can share biometric data such as fingerprints with the CIA. The CIA does this by offering […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I have come to a realization that I’m not very fond of, but in the world of security vs. convenience, security has to prevail. As we start having more and more smart things around us – from dishwashers to smart phones, we need to consider whether the manufacturer and/or distributor is committed to our security. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]