Google Online Security Blog: Announcing the first SHA1 collision
https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html?m=1 →
https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html?m=1 →
http://www.darkreading.com/vulnerabilities—threats/80–of-web-applications-contain-at-least-one-security-bug/d/d-id/1328233 There is still a lot to do to improve security of web applications. →
http://securityaffairs.co/wordpress/56445/hacking/rsa-conference-attendees-hacked.html You are not safe from hacking even is security conference. →
http://wtkr.com/2017/02/18/why-buying-used-cars-could-put-your-safety-at-risk/ Connected car can remain under control of previous owner. →
http://securityaffairs.co/wordpress/56367/hacking/aslr-protection-bypass.html →
http://www.theregister.co.uk/2017/02/14/the_government_is_coming_for_your_code/ ‘What we’re going to see is increased government involvement’ Schneier’s argument follows from accepting Marc Andreessen’s observation in 2011 that software is eating the world. “As everything turns into a computer, computer security becomes everything security,” said Schneier. Schneier likened the internet to a giant robot, one capable of affecting not just the virtual world →
http://www.networkworld.com/article/3168763/security/university-attacked-by-its-own-vending-machines-smart-light-bulbs-and-5-000-iot-devices.html?utm_source=dlvr.it&utm_medium=twitter#tk.rss_security Here is another story about vulnerable IoT devices causing problems. It shows again that it is a really good idea to keep IoT devices separated from your critical network. Building a completely separate network for IoT devices keeps making more and more sense every day. →
http://money.cnn.com/2017/02/15/technology/public-ports-charging-bad-stop/index.html Your smart phone is very vulnerable to attacks through USB charge/data port. So be careful where you plug your phone to – your phone can be easily hacked with maliscious USB charge port. →
https://www.wired.com/2017/02/flaw-millions-chips-strips-away-key-hacking-defense-software-cant-fully-fix/?mbid=social_fb ASLR attack makes security worse on many devices. →
https://opensource.com/article/17/1/yearbook-50-ways-avoid-getting-hacked?sc_cid=701600000011jJaAAI Linux and general security tips. →