Let me just cut straight to it: I’m going to open source the Have I Been Pwned code base. The decision has been a while coming and it took a failed M&A process to get here, but the code will be turned over to the public for the
The ongoing COVID-19 crisis has proven that applications are the driving force of the world economy. With a massive shift from brick-and-mortar locations to online operations across all industries during lockdowns, companies will likely continue to en… Continue reading 3 Tips to Safeguard Your Digital Future
Researchers from the Institute for Space Research at the Austrian Academy of Sciences have developed a technique in which lasers can measure the position of space debris during daylight conditions. Details of this unprecedented achievement were publish… Continue reading Scientists Spot Space Junk With Lasers In Broad Daylight
Touting it will deliver ‘patient-centric’ healthcare across the state. Continue reading WA government commits AU$8m to build an electronic medical record system
This year has been a bumper year for ransomware and its operators. Ransomware gangs are demanding millions; if those millions are not paid in time, then data stolen before encryption is either released to the public or sold to the highest bidder. Big … Continue reading Exorcist Ransomware and CIS Exclusion
It turns out that the root cause behind several previously disclosed speculative execution attacks against modern processors, such as Meltdown and Foreshadow, was misattributed to ‘prefetching effect,’ resulting in hardware vendors releasing incomplete… Continue reading Intel, ARM, IBM, AMD Processors Vulnerable to New Side-Channel Attacks
There doesn’t seem to be an end in sight to the COVID-19 crisis, but there are some important end-of-life/end-of-support dates we should be aware of when it comes to software. Before we dig into this month’s forecast of updates, I want to spend a littl… Continue reading August 2020 Patch Tuesday forecast: Planning for the end?
[Ryan] wanted to hack the Google Chrome Dinosaur Game so he could control the dinosaur with his own movements. The game only requires two keyboard presses (up and down arrow keys), so controlling the game with the Arduino Keyboard library only requires a few simple function calls.
He uses the …read more
Radiflow launches CIARA, a ROI-driven risk assessment and management platform for industrial organizations CIARA is a fully automated tool for assets data collection, data-driven analysis and transparent risk metrics calculation including risk scoring … Continue reading New infosec products of the week: August 7, 2020
Guardicore unveiled new capabilities for Infection Monkey, its free, open source breach and attack simulation (BAS) tool that maps to the MITRE ATT&CK knowledge base and tests network adherence to the Forrester Zero Trust framework. Infection Monk… Continue reading Open source tool Infection Monkey allows security pros to test their network like never before