Cyber security news August 2022
This posting is here to collect cyber security news in August 2022. I post links to security vulnerability news to comments of this article. You are also free to post related links to comments. →
This posting is here to collect cyber security news in August 2022. I post links to security vulnerability news to comments of this article. You are also free to post related links to comments. →
This posting is here to collect cyber security news in July 2022. I post links to security vulnerability news to comments of this article. You are also free to post related links to comments. →
Any device sporting a chip and some form of communications protocol can be hacked – that’s almost as strong a law as those governing gravity. Besides audio and video data, there are a number of parallel protocols in HDMI that transmit more information than we’d expect. There is I2C configuration data, HDCP (High-bandwidth Digital Content →
Critical side-channel vulnerabilities in modern processors became well known in 2018 with Meltdown and Spectre vulnerabilities. And several more same type vulnerabilities followed. Now the newest on this series is called Hertzbleed Attack. It is a a new family of side-channel attacks: frequency side channels. Hertzbleed takes advantage that, under certain circumstances, the dynamic frequency →
With IE, Microsoft caused great damage to the Web. I’m happy to see it finally go. You probably won’t miss IE much as a result, but it’s still hard to ignore the program’s impact and its flaws. Microsoft ends Internet Explorer support in Windows 10 tomorrow It’s the end of an era you probably won’t →
This posting is here to collect cyber security news in June 2022. I post links to security vulnerability news to comments of this article. You are also free to post related links to comments. →
‘Mute’ button in conferencing apps may not actually mute your mic! The users of remote meeting software have typically a poor understanding of how the mute system works, falsely assuming that audio input is cut when they activate it. This is not always the case. You’re muted — or are you? Videoconferencing apps may listen →
This posting is here to collect cyber security news in May 2022. I post links to security vulnerability news to comments of this article. You are also free to post related links to comments. →
Russia tried to cut off electricity to about two million Ukrainians in a cyber operation scheduled to take place on Friday night, April 8th. The Russian state-sponsored hacking group known as Sandworm tried on Friday to take down a large Ukrainian energy provider by disconnecting its electrical substations with a new variant of the Industroyer →
This posting is here to collect cyber security news in April 2022. I post links to security vulnerability news to comments of this article. You are also free to post related links to comments. →