EXPERT ADVICE |
How does a WebKit framework flaw enable denial-of-service attacks? |
A vulnerability in Apple's WebKit framework allows attackers to initiate phone calls through mobile apps on victims' devices. Expert Michael Cobb explains how the attack works. |
Politics of cyber attribution pose risk for private industry |
Why nation-state attribution plays a major role in the U.S. government's willingness to share cyberthreat intelligence with private-sector companies. |
Siemens SCADA systems: What is the impact of the vulnerabilities? |
Certain Siemens SCADA products were found to be vulnerable to local privilege escalation. Expert Nick Lewis explains how the vulnerability works and how to protect your systems. |
Panasonic Avionics IFE systems: How serious are the vulnerabilities? |
Panasonic Avionics' in-flight entertainment system vulnerabilities allow attackers to tamper with passenger seat displays. Expert Michael Cobb explains the impact of these flaws. |
How is session hijacking possible without passwords? |
Local Windows admins can perform session hijacking without passwords. Expert Judith Myerson explains how this type of attack works and what to include in a policy to prevent it. |
No comments:
Post a Comment