Is Your Peloton Spinning Up Malware? | McAfee Blogs

Is Your Peloton Spinning Up Malware? | McAfee Blogs

[Disclaimer: The McAfee ATR team disclosed this vulnerability to Peloton and promptly started working together to responsibly develop and issue a patch within the disclosure window. The patch was tested and confirmed effective on June 4, 2021.] Picture this: A hacker enters a gym or fitness center with a Peloton Bike+. They insert a tiny USB key with a boot image file containing malicious code that grants them remote root access. Since the attacker doesn’t need to factory unlock the bike to load the…

Read More

Healthcare + Security: Why it needs to matter to everyone

Healthcare + Security: Why it needs to matter to everyone

Healthcare + Security: Why it needs to matter to everyone | 2021-06-16 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Top 5 cybersecurity challenges in the hybrid office

Top 5 cybersecurity challenges in the hybrid office

Top 5 cybersecurity challenges in the hybrid office | 2021-06-16 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

ISC West Product Preview 2021

ISC West Product Preview 2021

ISC West Product Preview 2021 | 2021-06-16 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Ryan Gurney joins YL Ventures as CISO-in-Residence

Ryan Gurney joins YL Ventures as CISO-in-Residence

Ryan Gurney joins YL Ventures as CISO-in-Residence | 2021-06-16 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Using risk quantification to assess cyber risk

Using risk quantification to assess cyber risk

Using risk quantification to assess cyber risk | 2021-06-16 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

CX Cloud—expertise and insights at our fingertips – Cisco Blogs

CX Cloud—expertise and insights at our fingertips – Cisco Blogs

Over the years Cisco IT has built many tools to manage support. We had one tool to track subscriptions, another to keep tabs on service contracts, and yet another to view asset lifecycle information. The problem? We spent too much time correlating information scattered across the different interfaces. When we received a security alert on one interface, for instance, we had to go into another interface to identify the affected assets. Supporting the Cisco network…

Read More

Get More Done with Python’s asyncio

Get More Done with Python’s asyncio

Hopefully by now you’ve been embracing industry trends around network programmability.  Many network engineers are learning programming using popular languages like Python.  Indeed, it is a notable part in the blueprint from the DevNet Associate (DEVASC) certification.  You may be like me; you learn by doing.  We start with pretty simple script development to solve some current need – push config changes to many devices, upgrade software images across a set of branch offices, collect…

Read More

Intel unveils new type of network accelerator chip

Intel unveils new type of network accelerator chip

Intel on Monday expanded its network processor roadmap with the announcement of the Infrastructure Processing Unit (IPU). Think of it as the next step in the SmartNIC market, because Intel does. The announcement was made at the Six Five Summit 2021, where Navin Shenoy, the head of Intel’s Data Center Group, announced its intention to create the new processor family specifically for cloud workloads. There has been a move toward dedicated networking chips, called SmartNICs,…

Read More

“Homeless Hacker” Arrested

“Homeless Hacker” Arrested

Author and activist Christopher Doyon has been arrested in Mexico in connection with a cyber-attack on the Santa Cruz County government’s website carried out more than a decade ago. Doyon, who calls himself Commander X online, wrote and published the book Behind the Mask about his time as a member of hacking group Anonymous. On social media, the 56-year-old is also known as the Homeless Hacker. A former resident of Mountain View, California, Doyon was reportedly working…

Read More
1 3,318 3,319 3,320 3,321 3,322 3,586