Captain's Log, Stardate is an ongoing series, published every Friday, highlighting interesting cyber news from the past week. To continue the discussion on any of these topics, join us on Slack.
QR Codes Are Here to Stay. So Is the Tracking They Allow | NYTimes/Erin Woo
QR codes — essentially a kind of bar code that allows transactions to be touchless — have emerged as a permanent tech fixture from the coronavirus pandemic. QR codes have allowed some restaurants to build a database of their customers’ order histories and contact information. At retail chains, people may soon be confronted by personalized offers and incentives marketed within QR code payment systems. Read the full story...
Ethical Hacking (part 7.0/20): Denial-of-Service explained with tools and countermeasures | Maciej Zalwert
This article introduces one of the most common type of the cyberattack — Denial-of-Service (DoS) attack. DoS/DDoS attacks aim to paralyse a victim rather than to gain unauthorized access or corrupt data. In very general, it is about flooding with an excessive traffic or service requests to overload its resources. There are many ways on how such an attack may be performed. Read the full story...
5G Shortcut Leaves Phones Exposed to Stingray Surveillance | Wired/Lily Hay Newman
In North America and many other parts of the world, high-speed 5G mobile data networks dangled just out of reach for years. But as 5G coverage becomes ubiquitous, the rollout comes with an important caveat. Even if your phone says it's connected to the next-generation wireless standard, you may not actually be getting all of the features 5G promises—including defense against so-called stingray surveillance devices. Read the full story...
What Is the Maximum Human Lifespan? | Gunnar De Winter
A new study looks at the decline in specific blood markers and uses this to predict the maximum lifespan for humans. 122 years and 164 days. That is the current longevity record for humans. That was the age of the French Jeanne Calment when she passed away on. Since then, no one has even cleared the 120-year mark. Some researchers are pessimistic and claim that we’ve reached the biologically possible peak. Others contest this claim and suggest a certain flexibility in maximal human lifespan. Read the full story...
The Rise of Cyber Asset Attack Surface Management (CAASM) | Jennie Duong
CAASM technologies enable companies and teams to have complete visibility across all their assets (both internal and external) via API integrations with their existing tools, ability to query their consolidated data, and to identify the scope of vulnerabilities and gaps in security controls, and remediate issues. Understanding your entire cyber asset landscape and its relationship across your security posture is nearly impossible due the broad span of siloed tools and asset data. Understanding of all cyber assets and the relationships between them puts the context to build your entire cyber security program within reach. Read the full story...
- Over 400 pre-built JupiterOne queries (free)
- Join us on Slack to continue the discussion
- JupiterOne Platform (free) to setup your own queries and asset discovery
Posted By Mark Miller
Mark Miller speaks and writes extensively on DevOps and Security, hosting panel discussions on tools and processes within the DevOps Software Supply Chain.
Mark actively participates in the DevOps/DevSecOps community by building DevSecOps tracks at security conferences such as RSA Conference, InfoSec Europe, CD Summit, AppSec USA and AppSec EU. He is the Senior Storyteller and Senior Director of Community and Content at JupiterOne.
As well, Mark is Executive Producer of the DevSecOps Podcast Series (300K+ listens), and the Executive Editor of the LinkedIn DevOps Group (124K+ members).
To hear more from Mark, get our newsletter. No spam, just the good stuff once or twice a month. Sign up below.
Get updates from JupiterOne Mission Control
Fresh content and cool cybersecurity news alerts delivered to your inbox at least 2x a month! Just let us know where to send it.