Software Patches, Home Depot Breach, and Celebrity Selfie Hack If you need a quick source for all your information security (infosec) news, you've come to the right place. I summarize the most important infosec news in this weekly video, and provide links to other security stories as well. Unfortunately, today's episode includes a pretty creepy hack. The show covers next … [Read more...]
Blackhat and More – WSWiR Episode 116
Blackhat Summary,Lots of Patches, and MonsterMind Times have changed. Cyber attacks have increased 10-fold, causing a ton of information security (infosec) news each week. Can't keep up with it all? Let me help out. In this weekly video summary, I highlight the biggest information and security news every week. Last week, I had meant to post a Black Hat video summary, but … [Read more...]
Ebay Pwned – WSWiR Episode 108
Ebay Data Breach, IE8 0Day, and Alleged Chinese Hackers With all the information security (InfoSec) news coming out each week, it's hard to believe anyone can keep up with it; let alone an already busy IT professional with other things on his plate. If that sounds like you, rather than worrying about finding the most important security news you can let my weekly summary video … [Read more...]
TAO Hijack Routers – WSWiR Episode 107
Tons of Patches, NSA Booby-Trapped Routers, and Alleged Iranian Hackers If you don't have time to follow all the information security stories popping up each week, you can let our weekly video and blog post summarize the important stuff for you. In today's show, I recite the big list of security patches you need to get this week, talk about how the NSA is intercepting and … [Read more...]
Adobe Patch Day: Reader, Flash, and Illustrator Security Patches
Severity: High Summary: These vulnerabilities affect: Reader and Acrobat, Flash Player, and Illustrator (CS6) How an attacker exploits them: Multiple vectors of attack, including enticing your users to open malicious files or visit specially crafted web sites Impact: Various results; in the worst case, an attacker can gain complete control of your computer What to … [Read more...]