Cybersecurity

New ‘Hertzbleed’ Remote Side-Channel Attack

Critical side-channel vulnerabilities in modern processors became well known in 2018 with Meltdown and Spectre vulnerabilities. And several more same type vulnerabilities followed. Now the newest on this series is called Hertzbleed Attack. It is a a new family of side-channel attacks: frequency side channels. Hertzbleed takes advantage that, under certain circumstances, the dynamic frequency

End of IE is here

With IE, Microsoft caused great damage to the Web. I’m happy to see it finally go. You probably won’t miss IE much as a result, but it’s still hard to ignore the program’s impact and its flaws. Microsoft ends Internet Explorer support in Windows 10 tomorrow It’s the end of an era you probably won’t

New Spectre-v2 vulnerability

Meltdown and Spectre are vulnerabilities in modern computers that can be used to leak passwords and sensitive data. Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware vulnerabilities allow programs to steal data which is currently processed on the computer. The vulnerabilities were found in 2017 by several researches, but were kept secret

Unusual aircraft GPS interference

Finland’s Transport and Communications Agency, Traficom, has issued a public announcement informing of an unusual spike in GPS interference near the country’s eastern border. According to reports, the interference isn’t limited to Finland but also affects Poland, Lithuania, Latvia, and the broader Baltic region. This spoofing is relatively easy because the actual GPS signal is

Cyber attack maps

Cyber attacks happen all the time. There are many real-time cyber attack maps on-line. Articles Top 15 Live Cyber Attack Maps for Visualizing Digital Threat Incidents and 7 Live Cyber Attack Maps list many maps. Some are funny, some seem ominous, and all of them tell a story that words alone cannot: cyber attacks never