Remove Blog Remove Demo Remove Security Remove Video
article thumbnail

Weekly Update 390

Troy Hunt

Literally as I'm writing this, we're upgrading to Hyperscale so hopefully when I do next week's video from Tokyo, there'll be a happy story to tell (or I'll be drowning my sorrows in sake). References Sponsored by: Kolide ensures that if a device isn't secure, it can't access your apps.

Access 82
article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

Guest Blog: TalkingTrust. What’s driving the security of IoT? The Urgency for Security in a Connected World. It’s also enabling manufacturers to respond faster to security vulnerabilities, market demand, and even natural disasters. Device Security is Hard. Thu, 03/11/2021 - 07:39. They're attractive targets.

IoT 77
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nexx bugs allow to open garage doors, and take control of alarms and plugs

Security Affairs

” The researchers reported the issues to the United States Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA), which assigned the following five CVEs: Use of Hard-coded Credentials CWE-798 ( CVE-2023–1748 , CVSS3.0: Improper Input Validation CWE-20 ( CVE-2023–1751 , CVSS3.0:

article thumbnail

How You Can Start Learning Malware Analysis

Lenny Zeltser

Malware analysis sits at the intersection of incident response, forensics, system and network administration, security monitoring, and software engineering. As someone who’s helped thousands of security professionals learn how to analyze malware at SANS Institute , I have a few tips for how you can get started.

Metadata 145
article thumbnail

Weekly Update 336

Troy Hunt

I've just been watching a bit of the video while writing up this post and I reckon they're right. yet) Sponsored by: Kolide ensures only secure devices can access your cloud apps. Book a demo today. probably nothing. It's Device Trust tailor-made for Okta.

Cloud 84
article thumbnail

Weekly Update 357

Troy Hunt

Kevin was a friend and as I say in this week's video, probably the most well-known identity in infosec ever, and for good reason. I spent most of the day after recording this writing code and drafting the blog post and I'm pretty damn happy with each right now. Watch the demo today! Sad news to wake up to today.

Access 67
article thumbnail

Here's Why Your Static Website Needs HTTPS

Troy Hunt

Even the government has been pushing to drive adoption of HTTPS for all sites, for example in this post by the National Cyber Security Centre in the UK : all websites should use HTTPS, even if they don't include private content, sign-in pages, or credit card details. — Troy Hunt (@troyhunt) July 5, 2018. WiFi Pineapple.

Risk 110