Tag: encryption

Researchers: SCADA Mobile Apps Continue to Have ‘Shocking’ Number of Vulnerabilities

Despite their availability on mobile networks and thus increased exposure to outside security threats, SCADA apps remain highly insecure and vulnerable to attack, putting critical industrial control systems at immediate and increased risk, researchers at IOActive and Embedi have found.

Five Essential Reads to Understand the Meltdown and Spectre Processor Flaws

There has been plenty of (digital) ink spilled in recent days about widespread processor flaws known as “Meltdown” and “Spectre.” We round up five articles that will help you understand these security vulnerabilities, how they were discovered and their likely impact. 

Podcast Episode 76: Inside the Alteryx Breach with Chris Vickery

In this week’s edition of The Security Ledger Podcast we talk with security researcher and data spelunker Chris Vickery of the firm UpGuard about his discovery of  a data trove containing consumer profiles on 123 million American households. Also: there’s a tough new standard for handling federal data come January 1st in the form of NIST’s 800-171 standard. And: Katie Moussouris joins us back in the studio to talk about what the updated Wassenaar Arrangement means for security researchers.

University of Michigan Lands $3.6m DARPA Grant for Unhackable Hardware

The University of Michigan announced that it has received a $3.6 million grant to develop hardware based security features that will make Internet connected systems “unhackable.” The grant will fund a project called MORPHEUS, which is developing a means of fending off hackers by turning computer circuits into the equivalent of “unsolvable puzzles,” according to a statement issued by University of Michigan. The grant was issued as part of a $50-million DARPA program to improve cybersecurity by marrying cybersecurity features with hardware rather than software. “Instead of relying on software Band-Aids to hardware-based security issues, we are aiming to remove those hardware vulnerabilities in ways that will disarm a large proportion of today’s software attacks,” says Linton Salmon, manager of DARPA’s System Security Integrated Through Hardware and Firmware (SSITH) program. Nine grants have been awarded under the SSITH program, including the $3.6 million of funding for the University of Michigan […]

Information Security has a MeToo Problem

Podcast: Infosec has a #MeToo Problem also TOR-ifying Wikipedia

In this week’s Security Ledger Podcast, we talk with Genevieve Southwick, CEO of the B-Sides Las Vegas hacker conference about the information security industry’s #metoo problem and what steps conference organizers are taking to stem sexual assault and harassment at information security events. Also: researcher Alec Muffet talks with us about making a TOR version of Wikipedia (and why it’s not sticking around). Finally, Martin McKeay of Akamai talks about the state of Internet security one year after Mirai. (Spoiler alert: Mirai is still a problem.)