Peter Gwee

11 Flips | 1 Magazine | 8 Likes | @PeterGwee | Keep up with Peter Gwee on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Peter Gwee”

Honeytrap hacker attempted to steal RAF fighter jet secrets using Tinder

A honeytrap hacker attempted to steal secrets about Britain's stealth fighter jets through Tinder, it has emerged as the Armed Forces are warned over their use of online dating.<p>An RAF airwoman's dating profile was hijacked by a suspected spy who then got in touch with another RAF serviceman to try …

Aviation

Trezor — security glitches reveal your private keys!

As we all know, a few weeks ago there was a presentation about Trezor “glitches cause stitches” attacks at DEFCON 25. These attacks are possible …

X.509 metadata can carry information through the firewall

<b>Video</b> Certificate exchange used as a side-channel before the certs get to workA security researcher, who last year demonstrated that X.509 …

Information Security

Ropemaker Threat: Attackers Can Insert Malicious URLs After Email Is Received

A new type of attack targeting email inboxes could allow an attacker to turn a seemingly benign message into a malicious one after it has already …

The Evolution of Leadership in Information Risk and Cybersecurity

June 2017<p>Cyber attacks have emerged as a potential company killer. Cyber threats are more widespread and targeted — and continually evolving. It’s …

Changes Coming to NIST's Catalog of Security Controls

The latest ISMG Security Report leads with information security guru Ron Ross discussing changes coming to the National Institute of Standards and …

Teenage hackers sent to rehab to put their skills to good use in fight against cyber crime

Teenage hackers will be sent to cyber crime rehab camps to transform them into security experts under a new National Crime Agency scheme.<p>The law enforcement agency will enrol teenagers who have been found committing cyber offences onto a programme designed to stop them from entering serious …

Cybercrime

Hackers accidentally create network-busting malware

LAS VEGAS — Newly detailed malware can knock networks offline with devastating efficiency, although the effected networks might not be the ones …

All Malware Is Theft And That's OK

If all art is theft, so is all code. Ipso facto, all malware is theft too.<p>Take a look around Reddit, Github or Stackoverflow, as programmers and developers do everyday to appropriate others’ ideas, and that becomes all too apparent. Theft is at the heart of coding. And, just as Picasso made …

New Virus Able To Attack Apple Computers

Two security consultants have created a new computer worm, the Thunderstrike 2, that attacks the core hardware of a Mac computer once unleashed. The …

Ground control: Analysts warn airplane communications systems vulnerable to hacking

Commercial and even military planes have an Achilles heel that could leave them vulnerable to hackers on the ground, who experts say could conceivably commandeer cockpits and create chaos in the skies.<p>For now, terrorist groups are believed to lack the sophistication to bring down a plane remotely, …