Another Desktop Exploit – Silverlight Problem
Checkpoint has the scoop: http://www.checkpoint.com/downloads/partners/TCC-Silverlight-Jan2015.pdf Silverlight exploits may be less common, but unfortunately this particular exploit obfuscates itself and can infect the desktop that has loaded Silverlight. Background to Silverlight:…
Krebs notes Lizard attacked Sony with home routers
The hacker group Lizard Squad that attacked Sony and Microsoft on Christmas day: http://oversitesentry.com/christmas-hacking-while-you-were-out/ This was the result of their attack: Brian Krebs has done research (as he does) and…
Mac and Video Game Hacks
Video Games are getting more connected to the Internet, and thus are more likely to be hacked or DOS’ed (Denial of Service) Trend Micro listed a few items that happened…
Can We Stop Cybersecurity Breaches?
Dark Reading has an article on PCI compliance from end of last year: http://www.darkreading.com/risk/compliance/how-pci-dss-30-can-help-stop-data-breaches/a/d-id/1318306 An important paragraph: “In the cases of the largest data breaches, in 2014 a common point…
What is Biggest Challenge of Todays Cybersecurity?
There are a lot of 2015 prognostications and predictions, but instead of also going down that path I want to find and discuss our biggest cybersecurity challenge. Today’s car bomb…
