Cybersecurity

ETSI IoT security standard

Security standard for consumer IoT emerges. ETSI approved and published its standard ETSI EN 303 645 V2.1.1 (2020-06) – Cyber Security for Consumer Internet of Things: Baseline Requirements in June 2020. This puts it on track for final approval and release later this year. The standard specifies the high-level security and data protection provisions that

Cyber Security News October 2020

This posting is here to collect cyber security news October 2020. I post links to security vulnerability news with short descriptions to comments section of this article. If you are interested in cyber security trends, read my Cyber security trends 2020 posting. You are also free to post related links to comments.

Windows source code leaked?

Those sources seem toi indicate that some older Microsoft Windows versions seem to have gone “open source” without proper license… Microsoft’s source code for Windows XP and Windows Server 2003 has reported to be leaked online. Torrent files for both operating systems’ source code have been published on various file sharing sites this week. 43GB

Deadly malware and other software

Ransomware has become deadly! It does not kill just company profits, it has started also to kill people. Ransomware attack at German hospital leads to death of patient https://www.bleepingcomputer.com/news/security/ransomware-attack-at-german-hospital-leads-to-death-of-patient/ “A person in a life-threatening condition passed away after being forced to go to a more distant hospital due to a ransomware attack.” German Hospital Hacked,

Cyber security news September 2020

This posting is here to collect cyber security news September 2020. I post links to security vulnerability news with short descriptions to comments section of this article. If you are interested in cyber security trends, read my Cyber security trends 2020 posting. You are also free to post related links to comments.

Stingray and Hailstorm

Security researchers say they have developed a new technique to detect modern cell-site simulators. Little is known about stingrays that exploit flaws in the way that cell phones connect to 2G cell networks, because they are deliberately shrouded in secrecy. Most of those flaws are fixed in the 4G networks, though not all. Newer cell

Cyber security news August 2020

This posting is here to collect cyber security news in August 2020. I post links to security vulnerability news with short descriptions to comments section of this article. If you are interested in cyber security trends, read my Cyber security trends 2020 posting. You are also free to post related links to comments.

Cyber-attacks to power utility

Cyberattacks targeting a local power utility or end-user systems could propagate to the national bulk-power system and affect millions of people. We know that terrorists and state-sponsored actors already have the capabilities to disrupt a country’s power supply. The human costs of power-supply disruptions can go far beyond inconvenience. On 1 May, Donald Trump signed

Cyber security news July 2020

This posting is here to collect cyber security news in July 2020. I post links to security vulnerability news with short descriptions to comments section of this article. If you are interested in cyber security trends, read my Cyber security trends 2020 posting. You are also free to post related links to comments.

Change of computing terms?

ZDnet reports at https://www.zdnet.com/article/github-to-replace-master-with-alternative-term-to-avoid-slavery-references/ that a number of people and companies plan to drop terms like “master” and “slave” for alternatives like “main/default/primary” and “secondary;” but also terms like “blacklist” and “whitelist” for “allow list” and “deny/exclude list.” ZDNet found that projects like the OpenSSL encryption software library, automation software Ansible, Microsoft’s PowerShell scripting language,