article thumbnail

LinkedIn Shuts Down Four XSS Flaws, Is wireless the Trojan horse in your network security? and more

CTOvision

Windows 8 brushes up against 10% user share mark – As the new OS becomes more prevalent (especially in the mobile world) we’ll start to see threats targeting the OS specifically. ”‘ The Samsung Knox capability is the premiere mobile security solution, and it can offer hardware backed security.

Wireless 194
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

I suppose such things happen, but what I remember was her telling her surprise when the system booted up and the Windows 95 splash screen came up … wait, what? Here we were in the 21st century, and the lab was using an operating system that was no longer supported by Microsoft. First, this is a supply chain issue.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

I suppose such things happen, but what I remember was her telling her surprise when the system booted up and the Windows 95 splash screen came up … wait, what? Here we were in the 21st century, and the lab was using an operating system that was no longer supported by Microsoft. First, this is a supply chain issue.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

Stuxnet targets supervisory control and data acquisition systems. Instead of just targeting zero days in the Windows operating system- which it did -- it then infected Siemens Step7 systems, causing the fast-spinning centrifuges to tear themselves apart. HMI away that you know windows seven on it still?

System 52
article thumbnail

The Hacker Mind: Follow The Rabbit

ForAllSecure

And I remember calling Symantec and reporting a serious bug in an early version of their password manager. Their Operating System type was set to windows. This was strange since they were obviously running linux commands in a linux terminal so why is it set to windows? Vamosi: That’s how I beta test things.

article thumbnail

The Hacker Mind Podcast: The Fog of Cyber War

ForAllSecure

And if you're building that kind of operation, it has to be run professionally. Vamosi: Years ago, someone at Symantec told me that more and more malware was written by 9-5 criminal hackers, working monday to friday. So it pays off. So this trend actually started in the early 2000s. This was a positive change.