9 Sources For Tracking New Vulnerabilities
http://www.darkreading.com/vulnerabilities—threats/9-sources-for-tracking-new-vulnerabilities/d/d-id/1327186 This article lists many useful sources for information on new security vulnerabilities. →
http://www.darkreading.com/vulnerabilities—threats/9-sources-for-tracking-new-vulnerabilities/d/d-id/1327186 This article lists many useful sources for information on new security vulnerabilities. →
https://motherboard.vice.com/read/blame-the-internet-of-things-for-destroying-the-internet-today?utm_source=mbtwitter A massive botnet of hacked Internet of Things devices has been implicated in the cyberattack that caused a significant internet outage on Friday. The botnet, which is powered by the malware known as Mirai, is in part responsible for the attack that intermittently knocked some popular websites offline, according to Level 3 Communications, one →
http://www.thedailybeast.com/articles/2016/10/21/why-today-s-attacks-on-the-internet-are-just-the-start.html?via=twitter_page →
http://gizmodo.com/todays-brutal-ddos-attack-is-the-beginning-of-a-bleak-f-1788071976?utm_campaign=socialflow_gizmodo_facebook&utm_source=gizmodo_facebook&utm_medium=socialflow I don’t like this development in Internet attacks… →
http://dirtycow.ninja/ The vulnerability, a variety known as a race condition, was found in the way Linux memory handles a duplication technique called copy on write. Untrusted users can exploit it to gain highly privileged write-access rights to memory mappings that would normally be read-only. →
http://www.theregister.co.uk/2016/10/18/sha3256_good_for_beelions_of_years_say_boffins/ →
http://www.tripwire.com/state-of-security/featured/ghost-push-malware-continues-to-haunt-android-users/ Android malware hits very many devices each day. Remember to install apps only from trusted sources. →
http://electronicsofthings.com/expert-opinion/18-things-that-have-no-business-being-connected-to-the-internet/?utm_source=eotpage&utm_medium=eotpage&utm_campaign=eotpage&utm_content=eotposts Some things should not be connected with IoT. →
http://electronicsofthings.com/expert-opinion/risk-management-compliance/?utm_source=eotpage&utm_medium=eotpage&utm_campaign=eotpage&utm_content=eotposts There are several big risks on IoT. You need to understand those risk and keep them in control. →
https://threatpost.com/nuclear-power-plant-disrupted-by-cyber-attack/121216/ Nuclear power plant control system was not completely safe from hackers. →