News/Trends
- Ransomware ‘customer support’ chat reveals criminals’ ruthlessness
- Apple deleted server supplier after finding infected firmware in servers [Updated]
-
Poll: Hackers say it takes less than 12 hours to breach systems
-
Cloudbleed: Big web brands leaked crypto keys, personal secrets thanks to Cloudflare bug
- Frank Abagnale, world-famous con man, explains why technology won’t stop breaches
- Email Compromises, Phishing Top Insider Threats
- Serious Cloudflare bug exposed a potpourri of secret customer data
-
Police Have Arrested a Suspect in a Massive ‘Internet of Things’ Attack
Law/Policy
- FCC puts the brakes on ISP privacy rules it passed in October
-
What Are Your Rights if Border Agents Want to Search Your Phone?
-
Senators ask feds for ‘full account’ of work to secure election from cyber threats
Technical
-
Trojan of Things: Embedding Malicious NFC Tags into Common Objects
-
A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures
-
GANDALF: A fine-grained hardware-software co-design for preventing memory attacks
Reports, Blogs, Etc.