Security Stack Sheet #117

Posted in Sheets

Word of the Week “Cellebrite exploited” Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app’s perspective Cellebrite makes software to automate physically extracting and indexing data from mobile devices. They exist within the grey – where enterprise branding joins together with the larcenous to be called “digital intelligence.” Their customer list has included….

Security Stack Sheet #117
Security Stack Sheet #116

Security Stack Sheet #116

Posted in Sheets

Word of the Week “Inverse Privacy”  An item of your personal information is inversely private if some party has access to it but you do not. Inverse privacy is ubiquitous. Each interaction you have with commercial and other institutions generates inversely private data. The inverse privacy problem is unjustified inaccessibility of your inversely private data….

Security Stack Sheet #115

Posted in Sheets

   Word of the Week “Cyber Security 2020 in Review” 2020 was a year we will never forget. The year where the words “COVID-19” and “corona” were being said by the entire world in every other sentence. Where takeout food, wearing a mask became the norm. And it wasn’t just the pandemic that caused the….

Security Stack Sheet #115
Security Stack Sheet #114

Security Stack Sheet #114

Posted in Sheets

 Word of the Week “Top Security predictions for 2021” Link HERE Threat actors will turn home offices into their new criminal hubs The Covid-19 pandemic will upend cybersecurity priorities as it proves to be fertile ground for malicious campaigns Teleworking setups will force organizations to confront hybrid environments and unsustainable security architectures The unprecedented need….

Security Stack Sheet #113

Posted in Sheets

 Word of the Week “Cloud Security Threats for 2021” Persistency Attacks Cloud architecture allows for full flexibility when it comes to creating new instances and running virtual machines that can match any hardware or software environment desired. But that flexibility, if not properly secured, lets bad actors launch attacks — and persist in doing so….

Security Stack Sheet #113