authentication

VENOM Vulnerability Renews Shared Code Worries

In-brief: The recently disclosed VENOM vulnerability dispels the myth that virtual machines are immune to cyber attacks, and raises important questions about our reliance on shared code.

Surgical Robots The Latest To Fall To Whitehats

In-brief: Researchers from the University of Washington demonstrated attacks against “a slew” of exploitable vulnerabilities in a surgical robot they helped develop. They included attacks that could cause “jerky motion of robot’s arms” or render the surgical robot “motionless” and “almost unusable.”

Windows Bug From 1997 Enables Credential Theft

In-brief: Researchers from the firm Cylance warned that an unpatched security flaw first discovered in 1997 could be used to attack a wide range of popular applications and steal user credentials. 

Symantec: Common Security Ailments In Smart Home Technology

  In-brief: A Symantec survey of smart home products found a raft of common security mistakes, from weak (or missing) authentication to exploitable software vulnerabilities. 

Android SDK Flaw Could Enable Dropbox Data Theft

In-brief: IBM researchers say they discovered a flaw in an SDK from the cloud storage firm Dropbox that could result in Android users accidentally sending their data to a Dropbox account controlled by a malicious actor.