"While some outlets are calling this a ‘hack’…. —it’s an attack. It underscores how disruptions to availability can be just as damaging as breaches of confidentiality or integrity. Taking platforms offline can be just as damaging as stealing information. But beyond the attack itself, what’s interesting is the chaos of attribution and how multiple threat actors may be involved or simply capitalizing on the moment.
Drones need to be treated as any other Internet of Thing devices, with software that gathers and stores sensitive information that needs to be protected, according to IT security company CyberArk Labs.
The attack on telecommunications companies by the group APT10, detailed by US/Israel firm Cybereason on Tuesday, appears to be one that leverages privileged access in privileged accounts, the Research Team Lead at Israel-based firm CyberArk Labs says.
The increasing use of containers has opened a new avenue of entry for malicious attackers, a researcher from security outfit CyberArk Labs has warned, pointing out that container security was not straightforward and not well understood.
Digital rights organisation Electronic Frontiers Australia has urged Australians to do three things to protect their online privacy: get a password manager, review their Facebook settings and turn on two-factor authentication.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]