Sun.Aug 11, 2019

Boffins hacked Siemens Simatic S7, most secure controllers in the industry

Security Affairs

A group of Israeli researchers demonstrated that it is possible to take over the Simatic S7 controller one of the most secure controllers in the industry.

Hackers Can Turn Everyday Speakers Into Acoustic Cyberweapons

WIRED Threat Level

A security researcher has demonstrated how to force everyday commercial speakers to emit harmful sounds. Security Security / Cyberattacks and Hacks

How To 110

Gaining remote code execution using a tainted SQLite database

Security Affairs

Experts demonstrated that SQLite database can be abused by threat actors as an attack vector to execute malicious code in other apps.

Watch a Drone Take Over a Nearby Smart TV

WIRED Threat Level

Smart TVs continue to look dumber by the day. Security Security / Cyberattacks and Hacks

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Flaws in device drivers from 20 vendors allow hackers to install a persistent backdoor

Security Affairs

Researchers discovered multiple flaws in more than 40 device drivers from at least 20 different vendors that could to install a persistent backdoor on Windows PCs.

More Trending

Security Affairs newsletter Round 226

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Hi folk, let me inform you that I suspended the newsletter service, anyway I’ll continue to provide you a list of published posts every week through the blog. Once again thank you!

DEF CON 2019: Picture Perfect Hack of a Canon EOS 80D DSLR

Threatpost

Session shows how researchers found multiple vulnerability in Canon firmware that can be used in a malware attack. Black Hat Hacks IoT Vulnerabilities Canon EOS 80D DSLR DEF CON Picture Transfer Protocol ransomware

What is the Future of the Legal Technology Conference?

eDiscovery Daily

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. He has also been a great addition to our webinar program, participating with me on several recent webinars.