Security News
Puerto Rico is considered allowing for Internet voting. I have joined a group of security experts in a letter opposing the bill.
FiberLight, a fiber infrastructure provider with more than 20 years of construction experience building mission-critical, high-bandwidth networks, announces that it has been chosen as the lit network service provider of choice by Nextlink Internet across its Texas network. Nextlink had an existing 10GB network ring in place through FiberLight, but the company needed to expand its network infrastructure with 70 additional fiber-fed towers.
Israel-based startup L1ght aims to curb the spread of bad behavior online. Many internet users spread hate speech and exhibit abusive behavior to harm other users.
Israel-based startup L1ght aims to curb the spread of bad behavior online. Many internet users spread hate speech and exhibit abusive behavior to harm other users.
US lawmakers proposed legislation Thursday that could see internet companies held legally responsible for content on their platforms if they don't do enough to police child pornography. Senators from both parties, backed by the Department of Justice, said that existing laws immunizing internet hosts like social media companies from liability for user-posted content have allowed child pornography to proliferate.
This law journal article discusses the role of class-action litigation to secure the Internet of Things. Basically, the article postulates that market realities will produce insecure IoT devices, and political failures will leave that industry unregulated.
Zyxel's network storage boxes, business VPN gateways, firewalls, and, er, security scanners can be remotely hijacked by any miscreant, due to a devastating security hole in the firmware. If a miscreant can't directly connect to a vulnerable Zyxel device, "There are ways to trigger such crafted requests even if an attacker does not have direct connectivity to a vulnerable device," noted Carnegie Mellon's CERT Coordination Center in its advisory on the matter.
Zyxel's network storage boxes, business VPN gateways, firewalls, and, er, security scanners can be remotely hijacked by any miscreant, due to a devastating security hole in the firmware. If a miscreant can't directly connect to a vulnerable Zyxel device, "There are ways to trigger such crafted requests even if an attacker does not have direct connectivity to a vulnerable device," noted Carnegie Mellon's CERT Coordination Center in its advisory on the matter.
There's a Kickstarter for an actual candle, with real fire, that you can control over the Internet. What could possibly go wrong?...
Abstract: In the 2018 midterm elections, West Virginia became the first state in the U.S. to allow select voters to cast their ballot on a mobile phone via a proprietary app called "Voatz." Although there is no public formal description of Voatz's security model, the company claims that election security and integrity are maintained through the use of a permissioned blockchain, biometrics, a mixnet, and hardware-backed key storage modules on the user's device. We performed a clean-room reimplementation of Voatz's server and present an analysis of the election process as visible from the app itself.