Nick House

98 Flips | 1 Magazine | 7 Likes | @nibarricade | Keep up with Nick House on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Nick House”

New DHS cybersecurity command aims to protect U.S. from cyberattacks

In an effort to prevent and thwart cyberattacks, United States Department of Homeland Security (DHS) Secretary Kirstjen Nielsen announced the …

Cybersecurity

ProtonVPN

<b>Pros</b><p>Free version. Flexible, low-cost plans. Focus on physical security. Excellent privacy policies. Slick, accessible client. Multi-hop VPN to secure …

VPNs

Thermanator Attack Steals Passwords by Reading Thermal Residue on Keyboards

A person's fingers leave thermal residue on keyboard keys that a malicious observer could record and later determine the text a user has entered on …

CryptoCurrency Miner Plays Hide-and-seek with Popular Games and Tools

When the CPU utilization on a computer is high, games become less responsive, frame rate goes down, and gameplay stutters. To diagnose these …

Chinese gov't hackers snag secret missile plans in Navy contractor breach

SSL aims to parlay NASA, DARPA work into viable in-orbit repair business

<i>This article originally appeared in the June 4, 2018 issue of SpaceNews magazine.</i>Space Systems Loral’s booth at the Space Tech Expo in Pasadena, …

Multi-Stage Attacks Target Service Centers in Russia

<b>Fortinet security researchers recently observed a series of cyber-attacks targeting Russian service centers offering maintenance and support for</b> …

Critical Flaws Expose ABB Door Communication Systems to Attacks

<b>Researchers discovered several critical vulnerabilities in door communication systems made by Switzerland-based industrial tech company ABB. Both</b> …

The VPNFilter Botnet Is Attempting a Comeback

The VPNFilter botnet that was built by Russian cyberspies, which infected over 500,000 routers, and was taken down last week by the FBI is attempting …

Instead of Hacking Back, U.S. Companies Should Let Cyber Command Do It for Them

Having private companies "hack back" against their attackers in cyberspace has always been a controversial idea. It is also illegal in the United …

Encryption of AMD EPYC VMs can be broken, researchers prove

AMD EPYC server chipsets are supposed to provide a high level of security, but a German team has managed to gain control through a hypervisor exploit.<p>…

BackSwap Trojan Uses New Browser Monitoring and Injection Techniques

<b>A newly discovered banking Trojan uses innovative techniques to detect when a bank’s website is accessed and to inject malicious code into targeted</b> …

New Trojan Uses SQL Server for C&C

<b>A recently discovered banking Trojan leverages Microsoft SQL Server for communication with the command and control (C&C), IBM has discovered.</b><p>Dubbed …

Flaws in IBM QRadar Allow Remote Command Execution

<b>Three vulnerabilities discovered by a researcher in IBM’s QRadar product can be chained for an exploit that allows a remote and unauthenticated</b> …

Z-Shave Attack Could Impact Over 100 Million IoT Devices

The Z-Wave wireless communications protocol used for some IoT/smart devices is vulnerable to a downgrade attack that can allow a malicious party to …

US takes aim at Russian hackers who infected over 500,000 routers

More than half a million routers and network devices in 54 countries have been infected with sophisticated malware, researchers from Cisco's Talos Intelligence Group warn.<p>The malware, which the security researchers are calling VPNFilter, contains a killswitch for routers, can steal logins and …

Revealed: Pentagon Push to Hack Nuke Missiles Before They Launch

A former U.S. official calls the 2017 Pentagon policy document an ‘exercise to legally justify a potential attack on a North Korean missile on the …

Student awarded $36,000 for remote execution flaw in Google App Engine

The discovery was made by a university student who was not aware of how dangerous the vulnerability was.<p>Google has awarded a young cybersecurity …

Shadowy Hackers Accidentally Reveal Two Zero-Days to Security Researchers

An unidentified hacker group appears to have accidentally exposed two fully-working zero-days when they've uploaded a weaponized PDF file to a public …

DDoS Attacks Leverage UPnP Protocol to Avoid Mitigation

Attackers are experimenting with a new method of avoiding some DDoS mitigation solutions by employing the Universal Plug and Play (UPnP) protocol to …

IDG Contributor Network: The rise of the NIST cybersecurity framework

The National Institute of Standards and Technology (NIST), the technical standards agency, has recently released the widely-referenced Cybersecurity …

8 Ways Hackers Can Game Air Gap Protections

Isolating critical systems from connectivity isn't a guarantee they can't be hacked.

Information Security

New Rowhammer Attack Can Hijack Computers Remotely Over the Network

Exploitation of Rowhammer attack just got easier. Dubbed ‘Throwhammer,’ the newly discovered technique could allow attackers to launch Rowhammer …

Airbash – Fully Automated WPA PSK Handshake Capture Script

Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing. It is compatible with Bash and Android …

Linux

IBM bans all removable storage, for all staff, everywhere

Risk of ‘financial and reputational damage’ is too high, says CISOIBM has banned its staff from using removable storage devices.

The King is dead. Long live the King!

In late April 2018, a new zero-day vulnerability for Internet Explorer (IE) was found using our sandbox; more than two years since the last in the …

Android Phones Vulnerable to Remote Rowhammer Attack via GPU

<b>A team of researchers has shown how malicious actors could leverage graphics processing units (GPUs) to launch Rowhammer attacks remotely against</b> …

Kitty malware gets its claws into Drupal websites to mine Monero

Websites running vulnerable versions of the Drupal content management system are being targeted by the latest incarnation of the Kitty malware …

Researchers Find Mysterious Russia-Linked Malware That Hijacks Anti-Theft Software Lojack

Security researchers are warning that malware with suspected links to Russian cyber-espionage group and alleged Democratic National Committee hackers …

Unhackable Computer Chip

Researchers at NYU Abu Dhabi’s Design for Excellence (Dfx) lab have developed new innovations in computer chip technology that present landmark …