Latest cyber security publications
The topic of breach normalisation has been examined heavily before, but most of the discussion has centred around its obvious, negative effect – the desensitisation and numbing of society to each passing incident.
Tangible effects are rarely immediately apparent in the aftermath of a breach. News reports consequently lack visceral impact. It’s not immediately clear where data ends up — users are inclined to think there is a high chance that their data, representing one line in a tomb of a database, might never be deployed against them.
“I’ve actually had journalists tell me this in the past. They would actually say it’s difficult for us to talk about because we don’t have a picture or video or something we can frame it against to capture people’s attention.”
But Pinkard also says there are also positive effects to the phenomenon.
A joint paper by researchers at Oxford University, Singapore University of Technology and Design and the Helmholtz Centre for Information Security (CISPA) called the issue “a serious threat to the security and privacy of all Bluetooth users”.
Named the Key Negotiation of Bluetooth attack, the weakness fools the pair into creating a relatively shorter encryption key, making it easier for hackers to crack.
It’s easier than you think to operate a proactive security strategy, writes Jon Lucas For every business in today’s digital landscape, IT plays a vital role. Ensuring that systems and applications are working across all aspects of the company is not just an IT team’s problem, but something that the board should be involved in… Read More
Latest kubectl vulnerability linked to incomplete patch of previous flaw discovered in March A security researcher has discovered a fresh flaw in container orchestration platform Kubernetes, which if exploited could allow attackers to place malicious containers on users workstations. The vulnerability affects the Kubernetes kubectl command-line tool, a tool that allows users to copy files… Read More