How to Write a Secure Code in C/C++ Programming Languages – Pentestmag
https://pentestmag.com/write-secure-code-cc-programming-languages/ This article list many things you should keep in mind when writing software with C and C++. →
https://pentestmag.com/write-secure-code-cc-programming-languages/ This article list many things you should keep in mind when writing software with C and C++. →
http://news.softpedia.com/news/mirai-ddos-trojan-is-the-next-big-threat-for-iot-devices-and-linux-servers-507964.shtml This nasty trojan is targeted against Linux IoT devices. Mirai is an evolution of an older trojan, also used for DDoS attacks, known under many names, such as Gafgyt, Lizkebab, BASHLITE, Bash0day, Bashdoor, and Torlus. Mirai’s mode of operation is largely the same as Gafgyt, targeting IoT devices running Busybox. The trojan also targets →
http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/how-a-massive-540-gbsec-ddos-attack-failed-to-spoil-the-rio-olympics/ Rio Olympics was under constant heavy DDoS attack from IoT botnet – and still they managed to keep everything working. →
https://www.entrepreneur.com/article/25330 →
http://www.cyberciti.biz/networking/nmap-command-examples-tutorials/ To celebrate nmap birthday, here are some tips how to scan your network using nmap. →
https://thelasttechie.com/2016/09/04/the-security-risks-of-third-party-data/ More and more secrets end up to Internet – it is not usually user’s fault and there is not much what you can do about that. →
https://eforensicsmag.com/2016-security-predictions/ →
https://www.linkedin.com/pulse/penetration-test-vs-vulnerability-assessment-akyuz-cissp-cisa-pmp?trk=hp-feed-article-title-like Get to know what they are and how they are different with this article. →
http://spectrum.ieee.org/the-human-os/biomedical/devices/were-pacemakers-from-st-jude-medical-really-hacked?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+IeeeSpectrum+%28IEEE+Spectrum%29&utm_content=FaceBook This is an interesting case where security researchers claimed they have found serious vulnerability in medical device and earned money when the company stock value dropped. →
http://www.govinfosecurity.com/interviews/whats-best-way-to-handle-medical-device-security-concerns-i-3313 We need to work on protocol how to properly reveal security vulnerabilities on medical devices to keep patients safe. →