Dangerous Drone Encounters at UK Airports Jump by More Than a Third
IFSEC Global – Illegal drone intrusions into UK airport airspace have soared by 34.4% in 2018, according to a report by an air safety body.
Second Triton/Trisis critical infrastructure attack spotted
SC Magazine – A second attack against a critical infrastructure target has been launched using the Triton/Trisis custom attack framework.
Is your car at risk of a cyber attack?
What Car? – Cars are smarter than ever. Many can now let you do everything from dictating text messages to helping you find available parking spaces as you approach an unfamiliar city. There’s a potential downside to all this technology that you might not have considered, though: as soon as you use the sat-nav or Bluetooth or link your smartphone to your car, you’re automatically sharing a lot of information with it. And that information could be open to abuse or theft.
How companies can improve their vulnerability disclosure process
Cyberscoop – John Sheehy, VP of Strategy for IOActive, talks with Greg Otto on the changes around coordinated vulnerability disclosure.
‘Memsad’ software rot threatens to leak your digital secrets
The Parallax – VANCOUVER—If coding and updating software is like building and maintaining a house, one might say software that leaks passcodes is like a home with a rotting foundation—but you don’t know it. Ilja van Sprundel, the director of penetration testing at security research company IOActive, says he’s detected a significant amount of rot in the foundation of a wide swath of commonly used software code.