Cloud Misconfig Mistakes Show Need For DevSecOps

Unit 42 researchers discuss public cloud misconfiguration issues that are leading to breaches of sensitive data. Continue reading Cloud Misconfig Mistakes Show Need For DevSecOps

Bezos, WhatsApp Cyberattacks Show Growing Mobile Sophistication

The recently disclosed Jeff Bezos phone hack and other incidents show that mobile devices are being increasingly targeted by sophisticated nation-state attackers. Continue reading Bezos, WhatsApp Cyberattacks Show Growing Mobile Sophistication

Dark Web Fraud and Cybercrime with Emily Wilson

In episode 105 for January 27th 2020: What are the new forms of fraud and cybercrime being found on the Dark Web? We discuss this fascinating topic with Emily Wilson, VP of Research at Terbium Labs. ** Show notes and links mentioned on the show ** Emil… Continue reading Dark Web Fraud and Cybercrime with Emily Wilson

Superconference Interview: Sam Zeloof

In less than four days, the fifth Hackaday Superconference kicks off in Pasadena, California, and it’s shaping up to be a hoot. With a cavalcade of exciting workshops and talks on offer, hackers and makers are pouring in from across the globe for this celebration of software, firmware, and hardware. …read more

Continue reading Superconference Interview: Sam Zeloof

Superconference Interview: Carl Bugeja

It’s an exciting time of year for us, not because Christmas is on the horizon, instead for something far more exciting than that! The Hackaday Superconference is nearly upon us, our yearly gathering of the creme de la creme of the hardware hacking world for a fascinating program of lectures …read more

Continue reading Superconference Interview: Carl Bugeja

How to make a living with Embedded Systems

One of the biggest dreams anyone has is to make a living doing what they love. For all hackers, makers, and DIYers with a passion for embedded systems, it may make sense initially to pursue embedded systems design as a possible career, but without so much information on the types …read more

Continue reading How to make a living with Embedded Systems

Cyber Security Threats – Paul Claxton – ESW #156

Cyber Security Threats
The post Cyber Security Threats – Paul Claxton – ESW #156 appeared first on Security Weekly. Continue reading Cyber Security Threats – Paul Claxton – ESW #156