One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 467404
Date de publication 2018-02-09 14:00:00 (vue: 2018-02-09 14:00:00)
Titre Things I Hearted this Week 9th Feb 2018
Texte Much of this week’s news cycles were dominated by Space X successfully launching the Falcon Heavy rocket into space. Putting aside concerns of the cost, the feasibility, or other criticisms, it was just nice to see something positive and optimistic grab the headlines for a change. But that doesn’t mean the intergalactic world of cyber security sat quietly, oh no, we’ve got a whole bunch of things to talk about, so let’s jump right in. The House That Spied on Me By far one of the most engaging pieces I’ve read in a while is this Gizmodo article by Kashmir Hill and Surya Mattu on what happened when they decided to connect a whole bunch of “smart” devices in her apartment, and monitored what data was being collected and sent by these devices. The house that spied on me | Gizmodo Related Your TV is probably tracking you -- here's how to stop it | Cnet Boffins crack smartphone location tracking – even if you've turned off the GPS | The Register Amazon Says Don't Worry About This Raspberry Pi Key Hack -- But Is Fixing It Anyway | Forbes Ethereum Scammers make $5,000 in a night “Online scammers have made over $5,000 worth of Ethereum in one night alone, showing how gullible some cryptocurrency users can be. Miscreants achieved this by creating fake Twitter profiles for real-world celebrities and spamming the social network with messages tricking users to participate in "giveaways." Crooks deceived users into sending a small amount of Ethereum, promising they would receive the sum ten times over as part of the giveaway. All the messages followed the same pattern, even if the sums and Ethereum wallet addresses varied between the fake Twitter accounts.” Ethereum Scammers Make $5,000 in a Night by Impersonating Celebs on Twitter | Bleeping Computer Hunting Insecure Direct Object Reference Reading bug bounty reports where the researchers recount their steps are probably some of my favourite types of posts where I always end up learning something new. And this by Mohammed Abdul Raheem is no different. Hunting Insecure Direct Object Reference Vulnerabilities for Fun and Profit (part 1) | Codeburst.io Hunting Insecure Direct Object Reference Vulnerabilities for Fun and Profit (PART 2) | Codeburst.io Privacy down under While all eyes have been on GDPR, the Ozzies don’t want to be left behind as the Office of the Australian
Envoyé Oui
Condensat $1m $20 $20m “online ‘industry 000 12k 1988 2018 22nd 9th abdul about access accounts achieved across act address addresses alienvault all allowed alone always amazon amount another anything anyway apartment are article aside attack attacks aud australian authentication aws bad become been before behind being between bleeping boffins bounty breaches bucket bug bunch business but can card case celebrities celebs change chrome cnet codeburst collected comes commissioner compromise computer concerns confusing connect considered cost could crack creating criminal criticisms crooks cryptocurrency cso customers customers: cyber cycles data dawes day deceived decided defence defense devices didn’t different digital direct distributor distributors does doesn’t dominated don't don’t down effect end engadget engaging ethereum even everything exactly expose exposed exposes extensions eyes fake falcon far favourite feasibility feb feels firefox fixing flaw followed forbes fun gdpr get gets giveaway giveaways gizmodo glad goes good gooder got gps grab grammarly grammarly’s grown guidelines gullible hack hadn’t happened happens hard has have headlines hearted heavy held helpnetsecurity her here's hijacking hill house how hunting i’d i’m i’ve identified identifying identity impact impersonate impersonating includes individuals influence: influencers information insecure integral intergalactic introduces invest it’s jump just kashmir key launching leading learning left legitimate let’s like location log lying made magazine make makes marketing mass mattu may maybe… mean media messages million misconfigured miscreants mobile mohammed money monitored most motherboard much names ndb needs network neutralized new news nice night not notifiable notification number numbers object off office once one ones opened optimistic order organizations other out outlining over ozzies part participate particularly past patches pattern pdf penalties per phone pieces plans playing popular port positive posts potentially power pre precautions pretty principle privacy probably product profiles profit promise promising protected provider putting quietly raheem raspberry read reading real receive recount reference register related reports requirements researchers reuters right rocket roll run sacha same sat says scam scammers scams scheme security see sending sensitive sent services showing sim small smartphone social some something sophisticated space spamming spending spied spills stars startup state stating steps stop successfully sum summary sums surya swaps system take talk target targeted ten test text them these they’re things thousands threat threats time times tokes tracking tricking turned twitter two types ukraine ukraine’s ukrenergo under update: updated upguard usa use user users users’ using usual varied victims video vulnerabilities vulnerability wallet want warning we’ve web websites week week’s well what when where whole wide’ will working world worry worth would write writing years you've you’re your youtube
Tags Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: