Sun.Aug 11, 2019

Boffins hacked Siemens Simatic S7, most secure controllers in the industry

Security Affairs

A group of Israeli researchers demonstrated that it is possible to take over the Simatic S7 controller one of the most secure controllers in the industry.

Paper 114

Hackers Can Turn Everyday Speakers Into Acoustic Cyberweapons

WIRED Threat Level

A security researcher has demonstrated how to force everyday commercial speakers to emit harmful sounds. Security Security / Cyberattacks and Hacks

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Gaining remote code execution using a tainted SQLite database

Security Affairs

Experts demonstrated that SQLite database can be abused by threat actors as an attack vector to execute malicious code in other apps.

Watch a Drone Take Over a Nearby Smart TV

WIRED Threat Level

Smart TVs continue to look dumber by the day. Security Security / Cyberattacks and Hacks

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Flaws in device drivers from 20 vendors allow hackers to install a persistent backdoor

Security Affairs

Researchers discovered multiple flaws in more than 40 device drivers from at least 20 different vendors that could to install a persistent backdoor on Windows PCs.

More Trending

Security Affairs newsletter Round 226

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Hi folk, let me inform you that I suspended the newsletter service, anyway I’ll continue to provide you a list of published posts every week through the blog. Once again thank you!

What is the Future of the Legal Technology Conference?

eDiscovery Daily

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. He has also been a great addition to our webinar program, participating with me on several recent webinars.

Digital Right to Repair Movement seeks Allies at DEF CON

The Security Ledger

A grass roots movement to win a legal right to repair digital devices arrived at DEF CON in Las Vegas on Saturday with a message for an estimated 30,000 attendees: 'fight for repair.'. Related Stories Episode 160 Right to Repair’s Summer of Love – Sort of.

Michigan Medicine makes AI, machine learning a top tech priority

Information Management Resources

The academic medical center of the University of Michigan is leveraging investments in artificial intelligence, machine learning and advanced analytics to unlock the value of its health data

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.