Hacking Alexa through Alexa’s Speech
An Alexa can respond to voice commands it issues. This can be exploited: The attack works by using the device’s speaker to issue voice commands....
expat-2.4.7-1.fc36
FEDORA-2022-eeccd928a8 Packages in this update: expat-2.4.7-1.fc36 Update description: Rebase to version 2.4.7 Read More
Researchers find new way to neutralize side-channel memory attacks
Researchers at the Massachusetts Institute of Technology have discovered a way to foil memory-timing side-channel attacks that's more efficient than other methods. The attacks can...
Multiple Vulnerabilities in Mozilla Firefox and Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for remote code execution....
USN-5313-1: OpenJDK vulnerabilities
It was discovered that OpenJDK incorrectly handled deserialization filters. An attacker could possibly use this issue to insert, delete or obtain sensitive information. (CVE-2022-21248) It...
Gartner: SSE is SASE minus the SD-WAN
Security service edge (SSE) bundles a cloud access security broker, secure web gateway and ZTNA, according to Gartner. Read More
Musk Warns Starlink Could Attract Russian Bombs
Satellite comms system is helping Ukraine stay online Read More
ISO 27002 2013 to 2022 mapping
On February 15th, the International Organization for Standardization (ISO), published the latest update to “ISO/IEC 27002 Information security, cybersecurity and privacy protection — Information security...
Counterfeit and Pirated Imports Surge During Pandemic
Europol report warns of risk to economy and citizens’ health Read More
Ukraine Set to Join NATO Cyber Hub
Members voted unanimously to admit Eastern European nation Read More
