Most read categories

NIS2

NIS2

9 posts
Cybersecurity

Cybersecurity

42 posts
AI & ML

AI & ML

4 posts
Educational

Educational

59 posts
Automotive

Responsibility for Vehicle Security and Driver Privacy in the Age of the Connected Car

Source: Responsibility for Vehicle Security and Driver Privacy in the Age of the Connected Car Sponsored by: Veracode, Created by IDC Author: Duncan Brown   IDC conducted in-depth interviews with leading vehicle manufacturers and automotive industry representatives, as well as 1072 drivers across the UK and Germany. These are the questions that the survey had:   […]

Educational General

“Cyber Security” or “Cybersecurity” ?

“Cybersecurity” and “cyber security” are getting more and more mixed usage lately, so much that they are becoming almost as ambiguous as the term “cloud” was a few years back. The challenge information security executives and professionals are faced with is knowing  ̶  as the title implies  ̶  when and why the term should be […]

General

For many still not clear what “cloud” means

There is a very good and detailed article on Wikipedia about what Cloud computing means: Cloud computing, also known as on-demand computing, is a kind of Internet-based computing that provides shared processing resources and data to computers and other devices on-demand. It is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of […]

Automotive Security

Nissan’s connected car app offline after trivial to exploit vulnerability revealed

On Wednesday Nissan disabled an app that allowed owners of its electric Leaf car to control their cars’ heating and cooling from their phones, after the Australian researcher Troy Hunt showed he could use it to control others’ cars as well. The NissanConnect EV app, formerly called CarWings, enabled a remote hacker to access the Leaf’s temperature controls and review […]

Security security breach

Worst nightmare becomes reality: Linux Mint distro hacked and backdoor introduced

Linux distributor ‘Linux Mint’ warned users over the weekend that it has been hacked, exposing users to a malicious backdoor and compromising sensitive customer information. Project leader Clement Lefebvre explained in a blog post that the attacker made a modified Linux Mint ISO, with a backdoor in it, and then hacked the distributor’s website to […]

General

Digital clock mathemathics

If you’re like me, you definitely have such a digital clock somewhere in your house, most probably near your bed. Ever wondered what is the maximum number of segments of the clock that are used at a certain hour? And what time is it then? I did… and here is how I count them. I […]

Security Spam & Phishing

Why do the more recent spams have so colorful subjects?

And I mean really colorful, as in it has signs and colors. Like the one in the featured image. If you look in their source, they look like this: Subject: =?utf-8?b?8J+QlfCfkIhZb3UgY2FuIHNhdmUgb24gcGV0IGZvb2Qg8J+QlfCfkIg=?=     As it can be seen on this page, there are all possible symbols described: http://www.unicodetools.com/unicode/codepage-utf8.php All it has to do is to force […]