article thumbnail

Supply-Chain Attack against the Electron Development Platform

Schneier on Security

Electron is a cross-platform development system for many popular communications apps, including Skype, Slack, and WhatsApp. The vulnerability is not part of the applications themselves but of the underlying Electron framework -- ­and that vulnerability allows malicious activities to be hidden within processes that appear to be benign.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

There is also less hardware and compute power to work in your typical IoT device when compared to traditional devices, so embedding security becomes a matter of choice, rather than necessity. The same rings true for encryption and authentication. The same rings true for encryption and authentication. Security isn’t static.

IoT 77
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Application Security: Complete Definition, Types & Solutions

eSecurity Planet

Take advantage of CAPTCHAs (Completely Automated Public Turing tests to tell Computers and Humans Apart) to prevent automated attacks, protect against abuse, improve user experience, ensure authenticity of user-generated data, and ensure that only legitimate user interactions are processed.

article thumbnail

The Hacker Mind Podcast: Hacking Charity

ForAllSecure

This office had sort of crawled to a halt, because they were processing kids that had lost their parents and they were trying to find profiles and sponsors for them, sponsors that pay for their schooling and all that stuff, and their network, their computers were so screwed up that they had to like stop. It's an amazing archive to have.

article thumbnail

The Hacker Mind Podcast: Fuzzing Message Brokers

ForAllSecure

As I produce this episode, there's a dangerous new vulnerability known informally as Log4Shell, it’s a flaw in an open source Java logging library developed by the Apache Foundation and, in the hands of a malicious actor, could allow for remote code injection. And I think. And so, I would say doomsday scenarios probably not realistic.

article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

The Sleuth Kit enables administrators to analyze file system data via a library of command-line tools for investing disk images. Autopsy is its GUI and a digital forensics platform used widely in public and private computer system investigations to boost TSK’s abilities. image files, and analysis of remote computers.

article thumbnail

Is APT27 Abusing COVID-19 To Attack People ?!

Security Affairs

The following VBScript is run through cscript.exe, It’s an obfuscated and xor-encrypted payload. The encryption is performed by a simple xor having as key the single byte 0 while the encoding procedure is a multi conversion routine which could be summarized as follows: chr(asc(chr(“&h”&mid(x,y,2)))).