Wednesday, August 2, 2017

Broadpwn: World's first Wi-Fi worm puts iOS, Android devices at risk

Security Digest
Information security news and advice from TechTarget's network | August 2, 2017
TechTarget
FEATURED STORY
Breaking down the Broadpwn exploit, world's first Wi-Fi worm
by Rob Wright, Executive Editor

At Black Hat 2017, Exodus Intelligence researcher Nitay Artenstein unveiled the Broadpwn exploit, which he called the world's first Wi-Fi worm and which puts billions of iOS and Android devices at risk. (SearchSecurity.com)

Advertisement
NEWS
 
Experts debate Vulnerabilities Equities Process disclosure

Experts debated how the government should weigh disclosure in the Vulnerabilities Equities Process and whether to err on the side of offense or defense. (SearchSecurity.com)

 
Phishing research shows troubling trends for enterprise users

Karla Burnett of Stripe presented sobering results of phishing research from her company at Black Hat 2017, suggesting phishing training is ineffective against today's threats. (SearchSecurity.com)

 
Adobe's Flash end of life scheduled, finally, for 2020
News roundup: Adobe announced that Flash end of life will happen by the end of 2020. Plus, Microsoft expands its bug bounty program, the 2017 Pwnie Awards winners, and more. (SearchSecurity.com)
 
 
 

Industroyer malware a turning point for ICS security

Security researchers at Black Hat 2017 analyzed the Industroyer malware, the attack on Ukraine's power grid and what it means for industrial control system security in the U.S. (SearchSecurity.com)

 
Cyber-risk analysis, time are keys to infosec says game theory
Analyzing infosec through the lens of game theory shows that cyber-risk analysis and wasting attacker time may be highly effective cybersecurity strategies. (SearchSecurity.com)
 
Risk & Repeat: Why are Amazon S3 buckets spilling on the web?
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the series of enterprise data leaks through misconfigured Amazon S3 buckets and what should be done about them. (SearchSecurity.com)
 
 
 
EXPERT ADVICE
 
IPv6 addresses: Stability concerns and usage advice

Enterprises can deploy IPv6 addresses to improve privacy and security, but there are stability and usage considerations. Expert Fernando Gont explains what they are. (SearchSecurity.com)

 
Solving cloud console fatigue for enterprises
Kamal Shah of Skyhigh Networks explains how his company is battling cloud console fatigue for enterprises and expanding its CASB model beyond cloud applications. (SearchCloudSecurity.com)
 
 
 
 

SHA-1 collision: How the attack completely breaks the hash function

Researchers have successfully developed a SHA-1 attack where two pieces of data create the same hash value -- or collide. Expert Michael Cobb explains how this attack works. (SearchSecurity.com)

 
Did DDoS attacks cause the FCC net neutrality site to go down?

The FCC net neutrality comment site crashed, and it was blamed on DDoS attacks. Expert Matthew Pascucci looks at the technical side of this incident and what was behind it. (SearchSecurity.com)

 
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved.
TechTarget

No comments: