One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 459642
Date de publication 2018-01-19 14:00:00 (vue: 2018-01-19 14:00:00)
Titre Things I Hearted this Week – 19th Jan 2018
Texte Happy Friday wonderful people. It’s been a busy week in infosec with a flurry of activity, so let’s jump right in. The 100 Billion Dollar Infosec Question If someone gave you 100 billion dollars to improve information security, how would you spend it? No, seriously, please. Give it some thought. This question spurred Dan Klinedist to pen his thoughts in a thought-provoking post that will probably leave you with more questions than answers. The 100 Billion Dollar Infosec Question | Dan Klinedinst, Medium IT Security Spending to reach $96 billion in 2018 | Dark Reading Putting the bug in bounty I’m a big fan of bug bounties, I think that they have a lot of benefits. But, as with any emerging service, there will be issues. One of them is differentiating between Bug Bounty and Security Consulting or Testing. And that can cause some problems, which are very well articulated by John Carroll. BugBounty != Security Consulting | CTU Security Inside Uber’s $100,000 Payment to a Hacker, and the Fallout | NY Times Mirai Okiru botnet targets ARC-based IoT devices For those of you who don't know, ARC (Argonaut RISC Core) processors are the second most widely used processors in the world and can be found in all manner of unassuming connected devices, from car tech to storage, home and mobile devices. The new Mirai botnet, known as Mirai Okiru, is going after them with the aim knock them offline with distributed denial of service (DDoS) attacks. Mirai Okiru botnet targets for first time ever in the history ARC-based IoT devices | Security Affairs Mirai Okiru is a botnet that's going after ARC-based IoT gadgets | The Inquirer Mirai Okiru: New DDoS botnet targets ARC-based IoT devices | CSO Mental Models & Security: Thinking Like a Hacker Is it weird that I’m including one of my own articles from this week? Is that the equivalent of someone liking their own facebook posts? I’ve been reading up on mental models lately a lot and thought a lot could be applied to security, or as is often said, to think like a hacker. I listed seven of my favourite models in this Dark Reading contributed article. Mental Models & Security: Thinking Like a Hacker | Dark Reading LeakedSource Founder Arrested for Selling 3 Billion Stolen Credentials
Envoyé Oui
Condensat $100 $96 “a ‘net 000 100 19th 2014 2016 2018 about access according accounts activity affairs after aim alienvault all answers any anyone appear applied arc are area argonaut arrested ars article articles articulated attackers attacks authorities back banded banks based been behind benefits best better between big billion blog bloom botnet bounties bounty breaches bug bugbounty businesses busy but can canadian car carroll cause chaos character characters charge charged chicago chris collaboration colleague collected com com—a companies company company’s competitive compiled computer connected consulting contractor contributed core corrupts could court create credentials criminals cso ctu customers damaged dan dark data ddos decided denial destroys devices did didn't differentiating distributed district document dollar dollars doman’s don't dot edward emerging employee employer equivalent evan ever exploits facebook fake falling fallout fan favourite february fight financial first flurry formally former found founder friday from full gadgets gained gathered gave get getting give going good gov grainger grainger’s group hacked hacker hacking hacks happy hard have hearted help helping him his history hit home how hype i’m i’ve identity impact impersonate importance impromptu improve inc incidents including industrial information infosec inquirer inside insider institutions intentionally inventory iot issues it’s jan john jordan joseph july jump jumps justice kind klinedinst klinedist knock know known krebs lately latin leading leakedsource leave let’s lets like liking listed look looked lost lot machines maintained major man management manner many media medium meltdown mental metrics mildly mirai mobile models more most mounted network new news non notorious novel: november observations offline often okiru okiru: old one online ontario operating operator other otx out overcome own panic part password passwords patch patches payment pdf pen people person personal phishing plaintext please police post posts potentially practices prevalent prey probably problems processors profit program providers provoking public putting question questions rarely rcmp reach reading recommendations records reports repository right risc rolling room royal said scams second security security: selling series seriously servers service services seven share sharing showcase side sites slack small sold some someone something sorts soybel special spectre spectre/meltdown spend spending spot spurred status steinberg stolen stop storage successfully sun supports surprise targets tech technica telemetry terminated termination testing than that's them these things think thinking thornhill those though thought thoughts three through throughout tier tier1 time times tiny together took trends trick trusted uber’s unassuming unfettered unite unprepared upon use used using various vending vendor vendors very war wasn’t website week weird well what when where which who widely wild will within woefully wonderful work world world's would year
Tags Guideline
Stories Uber
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: