Security Week 42: SHA-1 collisions, a real hack for routers, Android/Security/Gloom
Konstantin Goncharov explains the bottom line of tech giants’ epic fails in the new edition of cybersecurity news digest.
9 articles
Konstantin Goncharov explains the bottom line of tech giants’ epic fails in the new edition of cybersecurity news digest.
In this edition of Security Week infosec digest we’ll cover three cases of companies being hacked and data being leaked and companies reacting on the incidents.
What is the difference between real and theoretical threats?
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
Our weekly news digest covers three stories about the mistakes coders make when programming robots, the way other people exploit those design flaws, and then the reckoning.
In the new installment of our explosive hit series “Infosec news” you’ll find: the breach of Bugzilla, Carbanak is coming back and Turla uses Level-God hard to track techniques to hide servers.
Information security digest: the greatest iOS theft, farewell to RC4 cipher, multiple vulnerabilities in routers
Infosec digest: exploit kit Neutrino in Wordpress, yet another GitHub DDoS, Wyndham responsible for breach, while Target is not
In this post there are two seemingly unrelated pieces of news which nevertheless have one thing in common: not that somewhere someone is vulnerable, but that vulnerability sometimes arises from reluctance to take available security measures.