…do you get it checked? It may seem a strange thing to think about, surely the programmers know how to produce secure code? But recent research has shown that even the biggest organisations have coders who continuously leave valuable credentials embedded in their public facing apps. These transgressions often arise …
Because It’s Friday – Cars, Cars, Cars…
Are you old enough to have been told, when you were at school, that everyone would have flying cars in the 21st Century? I am. So, articles on flying cars have been quite popular here on Smart Thinking and Octagon Technology. Swimming Cars When I saw this article about cars …
Apple and Google are plugging the same zero-day flaw
Research has now revealed that the cause of the recent Apple and Google zero-day patches was the same software library used by both software giants. Libwebp, a library found in millions of apps, was the source of the vulnerability. Incomplete disclosures by Apple and Google create “huge blindspot” for 0-day …
Continue reading “Apple and Google are plugging the same zero-day flaw”
The Android Risk
There are many posts on Smart Thinking highlighting malicious Android apps and I am constantly reminding you that if you have Android devices in your bring-your-own-device (BYOD) scheme then you need to take positive steps to manage them. Even if they are not your devices, they will have your information …
International Disruption of Threat Infrastructure
International co-operation and excellent police work can have an impact on cyber security threats large and small. Here is an example of the FBI and US Justice Department closing and seizing domains associated with international DDoS attacks. Feds seize 13 more DDoS-for-hire platforms in ongoing international crackdown | Ars Technica …
Continue reading “International Disruption of Threat Infrastructure”
