Sun.Aug 11, 2019

Boffins hacked Siemens Simatic S7, most secure controllers in the industry

Security Affairs

A group of Israeli researchers demonstrated that it is possible to take over the Simatic S7 controller one of the most secure controllers in the industry.

Paper 114

Hackers Can Turn Everyday Speakers Into Acoustic Cyberweapons

WIRED Threat Level

A security researcher has demonstrated how to force everyday commercial speakers to emit harmful sounds. Security Security / Cyberattacks and Hacks

Gaining remote code execution using a tainted SQLite database

Security Affairs

Experts demonstrated that SQLite database can be abused by threat actors as an attack vector to execute malicious code in other apps.

Watch a Drone Take Over a Nearby Smart TV

WIRED Threat Level

Smart TVs continue to look dumber by the day. Security Security / Cyberattacks and Hacks

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Flaws in device drivers from 20 vendors allow hackers to install a persistent backdoor

Security Affairs

Researchers discovered multiple flaws in more than 40 device drivers from at least 20 different vendors that could to install a persistent backdoor on Windows PCs.

Access 111

More Trending

Security Affairs newsletter Round 226

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Hi folk, let me inform you that I suspended the newsletter service, anyway I’ll continue to provide you a list of published posts every week through the blog. Once again thank you!

What is the Future of the Legal Technology Conference?

eDiscovery Daily

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. He has also been a great addition to our webinar program, participating with me on several recent webinars.

Digital Right to Repair Movement seeks Allies at DEF CON

The Security Ledger

A grass roots movement to win a legal right to repair digital devices arrived at DEF CON in Las Vegas on Saturday with a message for an estimated 30,000 attendees: 'fight for repair.'. Related Stories Episode 160 Right to Repair’s Summer of Love – Sort of.

Michigan Medicine makes AI, machine learning a top tech priority

Information Management Resources

The academic medical center of the University of Michigan is leveraging investments in artificial intelligence, machine learning and advanced analytics to unlock the value of its health data

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.