Is Your Car a BYOD Risk? Researchers Demonstrate How

If an employee's phone connects to their car and then their corporate network, an attack against the car can reach the company.

Dark Reading

Thinking about doing a #PoC of #E2E #encryption – sorry #Cat2Cat encryption. Leave a like there if there is interest for such a completely useless but secure messenger.
This project should show that #cats can carry messages in the #Neuland aka #internet.

#computer_security #privacy #ePrivacy #opensource

65% Of Employees Bypass Cybersecurity Measures, New Study Finds

More than half of workers surveyed say they've shared confidential data with external parties and bypassed other critical cyber protections. Here's what you need to know.

Forbes
Identity Verification Firm Used by X, TikTok, and Uber Exposed Users' Driver's Licenses

AU10TIX promised to keep user data safe but the company appears to have badly bungled its own security.

Gizmodo
One in four Americans have had their health data compromised this year

Cyber attacks in the healthcare industry are only getting more common

Quartz
Early Computer Security Papers, Part I
(1998) : Bishop, Matt
url: http://nob.cs.ucdavis.edu/~bishop/
#computer_security #computer_science #history #my_bibtex
Matt Bishop’s Home Page

Early Computer Security Papers, Part I
(1998) : Matt Bishop
url: http://nob.cs.ucdavis.edu/~bishop/
#computer_science #computer_security #history
#my_bibtex
Matt Bishop’s Home Page

Sudo Bug Lets Non-Privileged Linux and macOS Users Run Commands as Root

New Sudo Security Vulnerability (CVE-2019-18634) Could Let Non-Privileged Linux and macOS Users Run Commands as Root

Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted

A vulnerability in Sudo, tracked as CVE-2019-14287, could allow Linux users to run commands as root user even when they're restricted.