Phishing,Ransomware,Shadow Brokers,Vulnerabilities
On the WannaCry ransomware attack (Part 1, presumably…)
Last Friday the world was thrown smack-dab into the middle of its biggest-ever “cyber attack.” Popular as the term is, let’s stay clear of the word cyber and call it what it was: ransomware. Here’s a summary of the weekend’s […]
Data breach,Security,Shadow Brokers,Vulnerabilities
The NSA keeps vulnerabilities a secret – and the Shadow Brokers sell them
You can find all kinds of unusual things on the Internet. But last August something… unusually unusual popped up. A group calling themselves the Shadow Brokers announced that they would be auctioning off cyber weapons to the highest bidder. What’s […]
Internet of Things (IoT),Privacy,Vulnerabilities
The Internet of (Spying) Things – adult edition
Last week I wrote about Internet-enabled toys (for kids) that ended up having serious vulnerabilities (the toys, not the kids). Internet of Things, or IoT, toys have been in the news again recently, but this time the spotlight was on […]
Internet of Things (IoT),Vulnerabilities
On Hypponen’s law: Be smart, not vulnerable
A while back I was scrolling through my Twitter feed when I came across an interesting tweet: I have read plenty of laws, theories, and hypotheses during my time in academia, so I was well aware of the unwritten rule […]
Recent Comments