The Latest in IT Security

Posts Tagged ‘Exploit’

Update 7/30/2015 3:00pm EST: GM tells WIRED that it has now fixed the vulnerability that Kamkar’s proof-of-concept device exploited, with no action necessary for OnStar users. Kamkar says the problem is not yet resolved, however, and has been told by GM that the company is still working on it. GM’s Onstar service offers some of […]

Read more ...

People much smarter than me once said, “great defense requires understanding the enemy.” And man, that sounds wise as hell! That’s like long bearded dude on a mountaintop type of wise. And so we run with that and turn it into a training class, just like someone turned the profound wisdom of “there’s plenty more […]

Read more ...

A newly disclosed bug in widely-used OpenSSH software allows attackers to make thousands of password guesses in a short space of time. The bug has existed in OpenSSH since 2007, according to Ars Technica, and means that attackers have much longer than usual to brute-force a password. Normally OpenSSH allows just three or six login […]

Read more ...


Categories

FRIDAY, MARCH 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments