Security News
![S3 Ep61: Call scammers, cloud insecurity, and facial recognition creepiness [Podcast+Transcript]](/static/build/img/news/s3-ep61-call-scammers-cloud-insecurity-and-facial-recognition-creepiness-podcast-transcript-small.jpg)
Oh! No! The wannabe wizard that went to school with a trainee Sith. LISTEN NOW. Click-and-drag on the soundwaves below to skip to any point in the podcast.

It turns out that ES&S has bugs in their hash-code checker: if the "Reference hashcode" is completely missing, then it'll say "Yes, boss, everything is fine" instead of reporting an error. It's simultaneously shocking and unsurprising that ES&S's hashcode checker could contain such a blunder and that it would go unnoticed by the U.S. Election Assistance Commission's federal certification process.

Chen Ku-Chieh, an IoT cyber security analyst with the Panasonic Cyber Security Lab, is set to talk about the company's physical honeypot and about the types of malware they managed to discover through it at HITB CyberWeek on Wednesday. The use of IoT is increasingly widespread, from home IoT, office IoT to factory IoT, and the use of automation equipment is increasing.

Aviation boffins have found that next-gen collision aircraft avoidance systems appear to be just as vulnerable to signal spoofing attacks as older kit. In a paper distributed via ArXiv, computer scientists at the UK's University of Oxford and Switzerland's Federal Office for Defence Procurement analyzed the Airborne Collision Avoidance System X, due to be deployed on commercial aircraft in the next few years, and found that it can be manipulated by a miscreant to produce fake collision alerts that prompt pilots to take evasive action.

A study that analyzed all the vulnerability disclosures between 2010 and 2019 found that around 55% of all the security bugs that have been weaponized and exploited in the wild were for two major application frameworks, namely WordPress and Apache Struts. The Drupal content management system ranked third, followed by Ruby on Rails and Laravel, according to a report published this week by risk analysis firm RiskSense.

Interesting story of a flawed computer voting machine and a paper ballot available for recount. All ended well, but only because of that paper backup. Vote totals in a Northampton County judge's...

Insecurity Can Help Organizations Continually Learn and Make Changes read more

Will connected devices be insecure forever? Or will legislation - such as the recent UK mandate announced this week - help boost IoT security?
![Ep. 015 – USB anti-hacking, bypassing 2FA and government insecurity [PODCAST]](/static/build/img/news/alt/cyber-threat-stats-small.jpg)
Here's the latest Naked Security podcast - enjoy!

In August, President Trump signed the NIST Small Business Cybersecurity Act.