In-brief: New research from Akamai suggests that attackers are using new methods to carry out and cover up for malicious attacks, among them: harnessing harmless mobile carrier networks to carry out attacks such as SQL injection. Like this:Like Loading…Read more ›
Post Tagged with: "vulnerabilities"
In-brief: a new publication by IEEE lays out a “building code” for medical device makers to help address security and privacy issues in products. Like this:Like Loading…Read more ›
In-Brief: Software and the critical systems it powers are now central to our modern lives. But that very software is under growing threat and require new approaches to address those threats, says Symantec CTO Amit Mital. Successes in the arena of public health may be a guide. Like this:Like Loading…Read more ›
If you want an object lesson in the dangers that await us on the Internet of Things, check out SEC Consult’s write up on NetUSB, a widely used technology developed by an obscure Taiwanese company that just happens to contain a nasty, remotely exploitable vulnerability. According to this alert, published on Tuesday, NetUSB “suffers from a remotely exploitable kernel stack buffer overflow” that could be used to run malicious code on affected devices. Even worse: the NetUSB component is ubiquitous – found in a long list of devices, from low-end wireless access points and broadband routers for small office and home office deployments to what SEC Consult called “high end devices…released very recently.” Networking devices from 26 vendors, including TP-Link, NetGear and others were found to use the NetUSB technology in their products. The vulnerability discovered by SEC Consult is straight-forward enough. According to their advisory, the NetUSB code does an inadequate […]Read more ›