Remove story wired-guide-to-data-breaches
article thumbnail

Security Roundup January 2024

BH Consulting

BH Consulting Celebrates 20 Years in Business We are thrilled to announce and celebrate a significant milestone in our journey – 20 years of dedicated service in the field of cyber security and data protection. Meanwhile Wired named two ransomware gangs, Alphv and CIOp, among its ‘most dangerous people 2023’ list.

article thumbnail

Security Roundup January 2021

BH Consulting

Unsurprisingly, the SolarWinds supply chain attack stars in the year’s worst hacks and breaches from both Wired and Ars Technica. In a neat segue from our previous story, the newly published Cisco Security Outcomes Study aims to guide security leaders in their investments and help them to manage risk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

Inside Edition : Andy Greenberg, senior writer at Wired allowed two hackers to remotely control a 2014 Jeep Grand Cherokee that they say hadn't been altered in any way while driving on a highway in St. ” The event, which was captured on video and also reported in Wired magazine, sent a message to the automotive industry. .”

Hacking 52
article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

Smart Meters provide the data to support a cleaner future, showing how much energy is being used and how much this will cost you. After hearing a talk, a Dallas-based hacker set out to find out what was going on inside the smart meter attached to his home, and what he found was surprising. Environmental effects caused by pollution.

article thumbnail

IoT Secure Development Guide

Pen Test Partners

Introduction This guide deals with threat modelling and early stages of development so that security issues and controls are identified before committing to manufacturing. This guide is not just for technical developers, but for project managers and business analysts involved in product creation. Security is not binary or absolute.

IoT 52
article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

And modern fuzzers are not random, they’re guided so they dynamically work their way through the code, increasing their code coverage to find unknown vulnerabilities that can escape other software testing such as static analysis. Years ago, I was the lead security software reviewer at ZDNet and then at CNET. This was a software flaw.

article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

And modern fuzzers are not random, they’re guided so they dynamically work their way through the code, increasing their code coverage to find unknown vulnerabilities that can escape other software testing such as static analysis. Years ago, I was the lead security software reviewer at ZDNet and then at CNET. This was a software flaw.