Welcome to our

Cyber Security News Aggregator

.

Cyber Tzar

provide a

cyber security risk management

platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.

Weekly Update 256

published on 2021-08-13 23:03:04 UTC by Troy Hunt
Content:

Presently sponsored by: VMware

Weekly Update 256

Well this week went on for a bit, an hour and 6 mins in all. The 2 Apple things were particularly interesting due to the way in which both catching CSAM baddies and catching baddies who steal your things involves using technology that can be abused. Is it good tech because it can do good things? Bad tech because it can do bad things? Or is tech just morally neutral and we need to look at it more holistically? I argue the latter, but also acknowledge the views of both camps at either end of the argument. I think they're wrong (the extremes almost always are), but discuss them anyway 🙂

Weekly Update 256
Weekly Update 256
Weekly Update 256
Weekly Update 256

References

  1. Apple will start looking for known Child Sexual Abuse Material within people's photos (this is a really polarising topic, my thoughts within)
  2. Here's a really cool story of how AirTags were used to recover a stolen scooter (tracking can be good)
  3. Here's a really creepy story of how AirTags could be abused to stalk someone (tracking can be bad)
  4. The Turkish gov is now on HIBP (they're now the 26th gov with more in the pipeline)
  5. Firefox's in private mode now defaults all requests to be secure (yep, even when explicitly typing in the insecure scheme)
  6. I finally got around to updating Why No HTTPS? (still a heap of sites out there not doing secure connections right)
  7. Sponsored by: Varonis. Reduce your SaaS blast radius with data-centric security for AWS, G Drive, Box, Salesforce, Slack and more.
Article: Weekly Update 256 - published almost 3 years ago.

https://www.troyhunt.com/weekly-update-256/   
Published: 2021 08 13 23:03:04
Received: 2021 08 14 00:04:51
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Views: 3

Custom HTML Block

Click to Open Code Editor