Wednesday, September 19, 2018

Cold boot comeback: Researchers unveil new attack for modern systems

Security Digest
Information security news and advice from TechTarget's network| September 19, 2018
TechTarget
FEATURED STORY
Researchers bring back cold boot attacks on modern computers
by Michael Heller, Senior Reporter
The idea of cold boot attacks began ten years ago, but researchers at F-Secure found that the attack can be used on modern computers to steal encryption keys and other data. (SearchSecurity.com)
Advertisement
NEWS
 
New Mirai variant attacks Apache Struts vulnerability
New variants of the Gafgyt and Mirai botnets are targeting unpatched enterprise devices, which indicates a greater shift away from consumer devices, according to researchers. (SearchSecurity.com)
 
WannaMine cryptojacker targets unpatched EternalBlue flaw
Unpatched systems are still being targeted by the WannaMine cryptojacker, despite warnings and global cyberattacks using the EternalBlue exploit leaked from the NSA. (SearchSecurity.com)
 
British Airways data breach may be the work of Magecart
News roundup: The British Airways data breach may be the handiwork of hacking group Magecart, according to researchers. Plus, hacker Guccifer will be extradited to U.S., and more. (SearchSecurity.com)
 
Trend Micro apps fiasco generates even more questions
In addition to other Trend Micro apps banished from the Mac App Store for gathering data inappropriately, the company has admitted to publishing the Open Any Files app. (SearchSecurity.com)
 
Jake Braun discusses the Voting Village at DEF CON
The Voting Village at DEF CON 26 expanded its scope to test every aspect of election security that it could. Organizer Jake Braun discusses how it went and what's next. (SearchSecurity.com)
 
Risk & Repeat: Inside the GAO's Equifax breach report
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the Government Accountability Office's report on the Equifax breach and the questions it raises. (SearchSecurity.com)
EXPERT ADVICE
 
Understanding the risk SQL injection vulnerabilities pose
SQL injection vulnerabilities put a system at risk and are often unknown to users. Discover how this web vulnerability works and how to prevent it with expert Kevin Beaver. (SearchCloudSecurity.com)
 
SaaS platform security: The challenges of cloud network security
Organizations have the necessary tools to protect data stored and processed in IaaS platforms. Learn why SaaS platform security remains a challenge from expert Rob Shapland. (SearchSecurity.com)
 
Identity and access management in cloud: The way forward
Cloud services are major players in most companies now and can have a major impact on the management of access and identity governance. Learn how to handle IAM in the cloud era. (SearchSecurity.com)
 
How can attackers exploit a buffer underflow vulnerability?
A buffer underflow was found to be caused by a vulnerability in strongSwan's open source VPN. Learn how this is possible and how attackers can exploit it with Judith Myerson. (SearchSecurity.com)
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.
TechTarget

No comments: