Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2020-04-23 17:44:12 |
Episode 182: Hackers take Medical Devices \'off label\' to Save Lives (lien direct) |
In this episode of the podcast (#182) Trammell Hudson of Lower Layer Labs talks to us about Project Airbreak, his recent work to jailbreak a CPAP machines and how an NSA hacking tool helped make this inexpensive equipment usable as a makeshift respirator.
The post Episode 182: Hackers take Medical Devices ‘off label’ to Save Lives...Read the whole entry... _!fbztxtlnk!_ https://feeds.feedblitz.com/~/622248424/0/thesecurityledger -->»
|
Tool
|
|
|
|
2019-07-24 21:10:04 |
Spotlight Podcast: To Fix Remote Access, CyberArk Alero Ditches Passwords and VPNs (lien direct) |
In this Spotlight edition of The Security Ledger Podcast, sponsored by CyberArk*, we interview serial entrepreneur Gil Rapaport about his latest creation: Alero, a new remote authentication tool that promises to fix remote vendor access by doing away with passwords...and agents...and VPNs. If that sounds like a tall order, check out our podcast to...Read the whole entry... _!fbztxtlnk!_ https://feeds.feedblitz.com/~/604847200/0/thesecurityledger -->»
|
Tool
|
|
|
|
2019-01-22 13:52:02 |
LinkedIn Says Glitch, Not FSB, to Blame for Russian Job Postings (lien direct) |
LinkedIn Wednesday blamed an issue with its job ingestion tool–not Russian hackers or an online scam–as the reason the business social network was erroneously posting jobs located in Russia for a number of U.S.-based companies. The custom software tool that pulls in jobs from third-party websites onto LinkedIn’s site failed to...Read the whole entry... _!fbztxtlnk!_ https://feeds.feedblitz.com/~/593867780/0/thesecurityledger -->» |
Tool
|
|
|
|
2018-08-23 21:40:04 |
Cisco Links Remote Access Tool Remcos to Cybercriminal Underground (lien direct) |
Questions are being raised about whether remote-access and testing tools from a mysterious company called Breaking Security are made and sold by cyber criminals, after the tools have been widely adopted as a turnkey solution for setting up and running botnets, according to Cisco Talos. Security researchers said they’ve observed...Read the whole entry... _!fbztxtlnk!_ https://feeds.feedblitz.com/~/565859182/0/thesecurityledger -->» |
Tool
|
|
|
|
2018-07-23 17:57:02 |
Episode 105: Is Trolling a Human Rights Abuse? Also: the Do\'s and Dont\'s of Ransomware Negotiation (lien direct) |
In this week’s podcast: a report out last week from The Institute for the Future makes clear that state sponsored trolling has gone global and is now a go-to tool for repressive regimes worldwide, constituting a new form of human rights abuse. Ben Nimmo of The Atlantic Council joins us to discuss. Also: ransomware is one of the most...Read the whole entry... _!fbztxtlnk!_ https://feeds.feedblitz.com/~/560349116/0/thesecurityledger -->»
|
Ransomware
Tool
|
|
|
|
2018-03-07 14:52:00 |
Single Photo uniquely identifies Smartphone that took it (lien direct) |
Technology developed by researchers at the State University of New York can create a smartphone “fingerprint” from a single photo captured by the device. The technology may clear the way for a new identity verification system that can secure online transactions or protect smartphone owners from identity theft. The technology, developed...Read the whole entry... _!fbztxtlnk!_ https://feeds.feedblitz.com/~/530864124/0/thesecurityledger -->» |
Tool
|
|
★★★★
|