Cybersecurity

Ukraine-Russia cyber war

Ukraine and Russia seems to be at the moments on both traditional and cyber war. We could call that hybrid warfare. We are at a cyber war. Countless examples exist of damage to infrastructure from hostile acts via computer attacks. Russia’s invasion of Ukraine has been a hybrid war from the start, a mix of

Friday Fun: 2021 Information security in memes

Remember the most interesting events of the information security industry in 2021 in memes and tweets and fairy tales. 2021 Information security in memes and tweets https://www.kaspersky.com/blog/security-2021-year-in-memes/43237/ Hans Christian Andersen on security technologies https://www.kaspersky.com/blog/andersen-cybersecurity-technologies/43232/

Cyber security trends for 2022

Nothing is more difficult than making predictions. Instead of trowing out wild ideas what might be coming, I have collected here some trends other people have predicted or reported. Why the Future Needs Passwordless Authentication https://securityintelligence.com/future-needs-passwordless-authentication/ As of September, Microsoft users no longer have to rely on passwords when logging in to their accounts. Passwords

Max Headroom signal hijacking

Happy Max Headroom signal hijacking day!! https://en.m.wikipedia.org/wiki/Max_Headroom_signal_hijacking The Max Headroom signal hijacking occurred on the night of November 22, 1987, when the television broadcasts of two stations in Chicago, Illinois, United States, were hijacked in an act of broadcast piracy by a video of an unidentified person wearing a Max Headroom mask and costume. According

Dynamic random flip memory

Row hammer (also written as rowhammer) is a security exploit that takes advantage of an unintended and undesirable side effect in dynamic random-access memory (DRAM) in which memory cells interact electrically between themselves by leaking their charges, possibly changing the contents of nearby memory rows that were not addressed in the original memory access. The