Security News

Two of my cybersecurity courses at NMT asked students to write reports on recent security news. This continues to be a hobby of mine.

  • When Trump Phones Friends, the Chinese and the Russians Listen and Learn -
  • A solar observatory in New Mexico is evacuated for a week and the FBI is in
  • Inside the NSA's War on Internet Security - SPIEGEL ONLINE
  • How I Socially Engineer Myself Into High Security Facilities - Motherboard
  • The Worst Cybersecurity Breaches of 2018 So Far | WIRED
  • https://krebsonsecurity.com/2018/05/study-attack-on-krebsonsecurity-cost-iot-device-owners-323k/
  • https://krebsonsecurity.com/2018/01/first-jackpotting-attacks-hit-u-s-atms/
  • https://krebsonsecurity.com/2018/01/drug-charges-tripped-up-suspects-in-first-known-atm-jackpotting-attacks-in-the-us/
  • https://krebsonsecurity.com/2018/02/money-laundering-via-author-impersonation-on-amazon/
  • https://krebsonsecurity.com/2018/02/attackers-exploiting-unpatched-flaw-in-flash/
  • https://ide.onelang.io/
  • https://krebsonsecurity.com/2018/02/alleged-spam-kingpin-severa-extradited-to-us/
  • https://krebsonsecurity.com/2018/02/would-you-have-spotted-this-skimmer/
  • https://krebsonsecurity.com/2018/02/domain-theft-strands-thousands-of-web-sites/
  • DDoS Guide Relaunch: This Halloween, Keep Your Site Safe from Zombie Attack
  • https://www.eff.org/deeplinks/2018/01/how-assess-vendors-data-security
  • https://arstechnica.com/tech-policy/2018/02/12-years-in-prison-for-man-who-hacked-nasdaq-helped-swipe-160m-credit-cards/
  • Intel hit with 32 lawsuits over security flaws
  • https://motherboard.vice.com/amp/en_us/article/xw5yd7/how-iphone-iboot-source-code-leaked-on-github
  • Wanted: Weaponized exploits that hack phones. Will pay top dollar | Ars Tec

    Fascinating exploits:

  • [1802.02700] ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped
  • Samy Kamkar: PoisonTap - exploiting locked computers over USB
  • “Most serious” Linux privilege-escalation bug ever is under active exploit
  • Project Zero: A very deep dive into iOS Exploit chains found in the wild

    And of course, I have some preventative measures for various types of cyber attacks and cyber nuisances.