<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0" xml:base="https://news.hitb.org/">
  <channel>
    <title>hitb2018ams</title>
    <link>https://news.hitb.org/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Your logo and branded vulnerability aren't helping: How to disclose better</title>
  <link>https://news.hitb.org/content/your-logo-and-branded-vulnerability-arent-helping-how-disclose-better</link>
  <description>    &lt;article data-history-node-id="54538" role="article" class="node article teaser clearfix UTF-8"&gt;&lt;header&gt;&lt;h2 class="title text-center"&gt;&lt;a href="https://news.hitb.org/content/your-logo-and-branded-vulnerability-arent-helping-how-disclose-better" rel="bookmark"&gt;&lt;span&gt;Your logo and branded vulnerability aren't helping: How to disclose better&lt;/span&gt;
&lt;/a&gt;&lt;/h2&gt;
       
      &lt;div class="meta submit clearfix"&gt;
        &lt;div class="date text-right"&gt;
          &lt;span class="lowercase"&gt;posted on&lt;/span&gt;May 27, 2018
        &lt;/div&gt;
        &lt;div class="author"&gt;
                            
          &lt;span class="lowercase"&gt;by&lt;/span&gt; &lt;span&gt;&lt;span&gt;l33tdawg&lt;/span&gt;&lt;/span&gt;

        &lt;/div&gt;
      &lt;/div&gt;      
    &lt;/header&gt;&lt;div class="image-default"&gt;
        
            &lt;div&gt;  &lt;a href="https://news.hitb.org/content/your-logo-and-branded-vulnerability-arent-helping-how-disclose-better" hreflang="en"&gt;&lt;img loading="lazy" src="https://news.hitb.org/sites/default/files/styles/medium/public/2018-05/coordinated-disclosure-decision-tree.png?itok=hcY3c6se" width="220" height="124" alt="https://zdnet4.cbsistatic.com/hub/i/r/2018/05/25/19f62eb6-b404-49cb-9988-2fdd829ab3a4/resize/770xauto/f474073fa2a09a49eb20500169e13659/coordinated-disclosure-decision-tree.png" /&gt;&lt;/a&gt;
&lt;/div&gt;
      &lt;div class="image-credit"&gt;
        &lt;strong&gt;Credit:&lt;/strong&gt;
                  &lt;a href="https://zdnet4.cbsistatic.com/hub/i/r/2018/05/25/19f62eb6-b404-49cb-9988-2fdd829ab3a4/resize/770xauto/f474073fa2a09a49eb20500169e13659/coordinated-disclosure-decision-tree.png" target="_blank"&gt;https://zdnet4.cbsistatic.com/hub/i/r/2018/05/25/19f62eb6-b404-49cb-9988-2fdd829ab3a4/resize/770xauto/f474073fa2a09a49eb20500169e13659/coordinated-disclosure-decision-tree.png&lt;/a&gt;
              &lt;/div&gt;
      
      &lt;/div&gt;
     
    &lt;div class="content"&gt;
      
            &lt;div&gt;&lt;p&gt;In 2000, I leapt out of journalism and in to security communications. I was relocating to the San Francisco Bay Area and, despite the downturn, tech was king. I also wanted to lend my unique albeit non-technical skill set to a technology that protected people or, at the very least, attempted to reduce harm caused by malicious behavior.&lt;/p&gt;&lt;/div&gt;
      
    &lt;/div&gt;    
    &lt;div class="meta link clearfix"&gt;
      &lt;div class="comment"&gt;
                  &lt;span class="lowercase"&gt;no&lt;/span&gt;comment
                    
      &lt;/div&gt;
              &lt;div class="share text-center show-for-medium"&gt;
          &lt;span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/your-logo-and-branded-vulnerability-arent-helping-how-disclose-better" data-a2a-title="Your logo and branded vulnerability aren't helping: How to disclose better"&gt;&lt;a class="a2a_button_facebook"&gt;&lt;span class="fa fa-facebook"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_twitter"&gt;&lt;span class="fa fa-twitter"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_linkedin"&gt;&lt;span class="fa fa-linkedin"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_email"&gt;&lt;span class="fa fa-envelope"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
        &lt;/div&gt;
            &lt;div class="read-more"&gt;&lt;a href="https://news.hitb.org/content/your-logo-and-branded-vulnerability-arent-helping-how-disclose-better"&gt;&lt;span class="lowercase"&gt;→&lt;/span&gt;READ MORE&lt;/a&gt;&lt;/div&gt; 
    &lt;/div&gt;
  &lt;/article&gt;</description>
  <pubDate>Sun, 27 May 2018 06:13:15 +0000</pubDate>
    <dc:creator>l33tdawg</dc:creator>
    <guid isPermaLink="false">54538 at https://news.hitb.org</guid>
    </item>
<item>
  <title>Industry CMO on the Downstream Risks of "Logo Disclosures"</title>
  <link>https://news.hitb.org/content/industry-cmo-downstream-risks-logo-disclosures</link>
  <description>    &lt;article data-history-node-id="54491" role="article" class="node article teaser clearfix UTF-8"&gt;&lt;header&gt;&lt;h2 class="title text-center"&gt;&lt;a href="https://news.hitb.org/content/industry-cmo-downstream-risks-logo-disclosures" rel="bookmark"&gt;&lt;span&gt;Industry CMO on the Downstream Risks of "Logo Disclosures"&lt;/span&gt;
&lt;/a&gt;&lt;/h2&gt;
       
      &lt;div class="meta submit clearfix"&gt;
        &lt;div class="date text-right"&gt;
          &lt;span class="lowercase"&gt;posted on&lt;/span&gt;May 2, 2018
        &lt;/div&gt;
        &lt;div class="author"&gt;
                            
          &lt;span class="lowercase"&gt;by&lt;/span&gt; &lt;span&gt;&lt;span&gt;l33tdawg&lt;/span&gt;&lt;/span&gt;

        &lt;/div&gt;
      &lt;/div&gt;      
    &lt;/header&gt;&lt;div class="image-default"&gt;
        
            &lt;div&gt;  &lt;a href="https://news.hitb.org/content/industry-cmo-downstream-risks-logo-disclosures" hreflang="en"&gt;&lt;img loading="lazy" src="https://news.hitb.org/sites/default/files/styles/medium/public/2018-05/Screen%20Shot%202018-05-02%20at%2016.48.53.png?itok=QauddzWj" width="220" height="129" alt="https://conference.hitb.org/hitbsecconf2018ams/sessions/keynote-2-a-risk-assessment-of-logo-disclosures/" /&gt;&lt;/a&gt;
&lt;/div&gt;
      &lt;div class="image-credit"&gt;
        &lt;strong&gt;Credit:&lt;/strong&gt;
                  &lt;a href="https://conference.hitb.org/hitbsecconf2018ams/sessions/keynote-2-a-risk-assessment-of-logo-disclosures/" target="_blank"&gt;https://conference.hitb.org/hitbsecconf2018ams/sessions/keynote-2-a-risk-assessment-of-logo-disclosures/&lt;/a&gt;
              &lt;/div&gt;
      
      &lt;/div&gt;
     
    &lt;div class="content"&gt;
      
            &lt;div&gt;&lt;p&gt;Jennifer Leggio, chief marketing officer at Flashpoint, is an executive with more than a decade's experience in managing corporate cyber security marketing at the highest levels -- much of the time seeking and advocating a greater ethical stance in marketing. At last month's Hack in the Box Conference in Amsterdam, &lt;a href="https://conference.hitb.org/hitbsecconf2018ams/sessions/keynote-2-a-risk-assessment-of-logo-disclosures/"&gt;she delivered a keynote presentation entitled, 'A Risk Assessment of Logo Disclosures'&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;
      
    &lt;/div&gt;    
    &lt;div class="meta link clearfix"&gt;
      &lt;div class="comment"&gt;
                  &lt;span class="lowercase"&gt;no&lt;/span&gt;comment
                    
      &lt;/div&gt;
              &lt;div class="share text-center show-for-medium"&gt;
          &lt;span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/industry-cmo-downstream-risks-logo-disclosures" data-a2a-title="Industry CMO on the Downstream Risks of "Logo Disclosures""&gt;&lt;a class="a2a_button_facebook"&gt;&lt;span class="fa fa-facebook"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_twitter"&gt;&lt;span class="fa fa-twitter"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_linkedin"&gt;&lt;span class="fa fa-linkedin"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_email"&gt;&lt;span class="fa fa-envelope"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
        &lt;/div&gt;
            &lt;div class="read-more"&gt;&lt;a href="https://news.hitb.org/content/industry-cmo-downstream-risks-logo-disclosures"&gt;&lt;span class="lowercase"&gt;→&lt;/span&gt;READ MORE&lt;/a&gt;&lt;/div&gt; 
    &lt;/div&gt;
  &lt;/article&gt;</description>
  <pubDate>Wed, 02 May 2018 14:47:44 +0000</pubDate>
    <dc:creator>l33tdawg</dc:creator>
    <guid isPermaLink="false">54491 at https://news.hitb.org</guid>
    </item>
<item>
  <title> HomeKit: Sicherheitsforscher sieht grundlegende Lücke – Apple ergreift Gegenmaßnahmen </title>
  <link>https://news.hitb.org/content/homekit-sicherheitsforscher-sieht-grundlegende-lucke-apple-ergreift-gegenmassnahmen</link>
  <description>    &lt;article data-history-node-id="54480" role="article" class="node article teaser clearfix UTF-8"&gt;&lt;header&gt;&lt;h2 class="title text-center"&gt;&lt;a href="https://news.hitb.org/content/homekit-sicherheitsforscher-sieht-grundlegende-lucke-apple-ergreift-gegenmassnahmen" rel="bookmark"&gt;&lt;span&gt; HomeKit: Sicherheitsforscher sieht grundlegende Lücke – Apple ergreift Gegenmaßnahmen &lt;/span&gt;
&lt;/a&gt;&lt;/h2&gt;
       
      &lt;div class="meta submit clearfix"&gt;
        &lt;div class="date text-right"&gt;
          &lt;span class="lowercase"&gt;posted on&lt;/span&gt;May 1, 2018
        &lt;/div&gt;
        &lt;div class="author"&gt;
                            
          &lt;span class="lowercase"&gt;by&lt;/span&gt; &lt;span&gt;&lt;span&gt;l33tdawg&lt;/span&gt;&lt;/span&gt;

        &lt;/div&gt;
      &lt;/div&gt;      
    &lt;/header&gt;&lt;div class="image-default"&gt;
        
            &lt;div&gt;  &lt;a href="https://news.hitb.org/content/homekit-sicherheitsforscher-sieht-grundlegende-lucke-apple-ergreift-gegenmassnahmen" hreflang="en"&gt;&lt;img loading="lazy" src="https://news.hitb.org/sites/default/files/styles/medium/public/2018-05/Bildschirmfoto_2018-04-27_um_12-b726718c4eb58831.png?itok=TpCqMRZF" width="220" height="124" alt="https://heise.cloudimg.io/width/700/q75.png-lossy-75.webp-lossy-75.foil1/_www-heise-de_/imgs/18/2/4/1/6/9/4/2/Bildschirmfoto_2018-04-27_um_12-b726718c4eb58831.png" /&gt;&lt;/a&gt;
&lt;/div&gt;
      &lt;div class="image-credit"&gt;
        &lt;strong&gt;Credit:&lt;/strong&gt;
                  &lt;a href="https://heise.cloudimg.io/width/700/q75.png-lossy-75.webp-lossy-75.foil1/_www-heise-de_/imgs/18/2/4/1/6/9/4/2/Bildschirmfoto_2018-04-27_um_12-b726718c4eb58831.png" target="_blank"&gt;https://heise.cloudimg.io/width/700/q75.png-lossy-75.webp-lossy-75.foil1/_www-heise-de_/imgs/18/2/4/1/6/9/4/2/Bildschirmfoto_2018-04-27_um_12-b726718c4eb58831.png&lt;/a&gt;
              &lt;/div&gt;
      
      &lt;/div&gt;
     
    &lt;div class="content"&gt;
      
            &lt;div&gt;&lt;p class="article-content__lead"&gt;Manipulierte Smart-Home-Geräte mit Apple-Chip können den Schlüssel zum WLAN des Nutzers preisgeben, warnt ein Sicherheitsforscher. Es handle sich um ein grundlegendes Problem, das für Jahre bestehen werde – nicht nur bei Apple.&lt;/p&gt;&lt;/div&gt;
      
    &lt;/div&gt;    
    &lt;div class="meta link clearfix"&gt;
      &lt;div class="comment"&gt;
                  &lt;span class="lowercase"&gt;no&lt;/span&gt;comment
                    
      &lt;/div&gt;
              &lt;div class="share text-center show-for-medium"&gt;
          &lt;span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/homekit-sicherheitsforscher-sieht-grundlegende-lucke-apple-ergreift-gegenmassnahmen" data-a2a-title=" HomeKit: Sicherheitsforscher sieht grundlegende Lücke – Apple ergreift Gegenmaßnahmen "&gt;&lt;a class="a2a_button_facebook"&gt;&lt;span class="fa fa-facebook"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_twitter"&gt;&lt;span class="fa fa-twitter"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_linkedin"&gt;&lt;span class="fa fa-linkedin"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_email"&gt;&lt;span class="fa fa-envelope"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
        &lt;/div&gt;
            &lt;div class="read-more"&gt;&lt;a href="https://news.hitb.org/content/homekit-sicherheitsforscher-sieht-grundlegende-lucke-apple-ergreift-gegenmassnahmen"&gt;&lt;span class="lowercase"&gt;→&lt;/span&gt;READ MORE&lt;/a&gt;&lt;/div&gt; 
    &lt;/div&gt;
  &lt;/article&gt;</description>
  <pubDate>Tue, 01 May 2018 06:57:19 +0000</pubDate>
    <dc:creator>l33tdawg</dc:creator>
    <guid isPermaLink="false">54480 at https://news.hitb.org</guid>
    </item>
<item>
  <title>Apple Is Struggling To Stop A 'Skeleton Key' Hack On Home Wi-Fi</title>
  <link>https://news.hitb.org/content/apple-struggling-stop-skeleton-key-hack-home-wi-fi</link>
  <description>    &lt;article data-history-node-id="54474" role="article" class="node article teaser clearfix UTF-8"&gt;&lt;header&gt;&lt;h2 class="title text-center"&gt;&lt;a href="https://news.hitb.org/content/apple-struggling-stop-skeleton-key-hack-home-wi-fi" rel="bookmark"&gt;&lt;span&gt;Apple Is Struggling To Stop A 'Skeleton Key' Hack On Home Wi-Fi&lt;/span&gt;
&lt;/a&gt;&lt;/h2&gt;
       
      &lt;div class="meta submit clearfix"&gt;
        &lt;div class="date text-right"&gt;
          &lt;span class="lowercase"&gt;posted on&lt;/span&gt;April 26, 2018
        &lt;/div&gt;
        &lt;div class="author"&gt;
                            
          &lt;span class="lowercase"&gt;by&lt;/span&gt; &lt;span&gt;&lt;span&gt;l33tdawg&lt;/span&gt;&lt;/span&gt;

        &lt;/div&gt;
      &lt;/div&gt;      
    &lt;/header&gt;&lt;div class="image-default"&gt;
        
            &lt;div&gt;  &lt;a href="https://news.hitb.org/content/apple-struggling-stop-skeleton-key-hack-home-wi-fi" hreflang="en"&gt;&lt;img loading="lazy" src="https://news.hitb.org/sites/default/files/styles/medium/public/2018-04/forbes-apple.jpg?itok=01yR_jhQ" width="220" height="148" alt="https://thumbor.forbes.com/thumbor/960x0/https%3A%2F%2Fspecials-images.forbesimg.com%2Fdam%2Fimageserve%2F48b3529fbc9a4e15bba2480a86450f80%2F960x0.jpg%3Ffit%3Dscale" /&gt;&lt;/a&gt;
&lt;/div&gt;
      &lt;div class="image-credit"&gt;
        &lt;strong&gt;Credit:&lt;/strong&gt;
                  &lt;a href="https://thumbor.forbes.com/thumbor/960x0/https%3A%2F%2Fspecials-images.forbesimg.com%2Fdam%2Fimageserve%2F48b3529fbc9a4e15bba2480a86450f80%2F960x0.jpg%3Ffit%3Dscale" target="_blank"&gt;https://thumbor.forbes.com/thumbor/960x0/https%3A%2F%2Fspecials-images.forbesimg.com%2Fdam%2Fimageserve%2F48b3529fbc9a4e15bba2480a86450f80%2F960x0.jpg%3Ffit%3Dscale&lt;/a&gt;
              &lt;/div&gt;
      
      &lt;/div&gt;
     
    &lt;div class="content"&gt;
      
            &lt;div&gt;&lt;p&gt;Even with all Apple's expertise and investment in cybersecurity, there are some security problems that are so intractable the tech titan will require a whole lot more time and money to come up with a fix. Such an issue has been uncovered by Don A. Bailey, founder of Lab Mouse Security, who described to Forbes a hack that, whilst not catastrophic, exploits iOS devices' trust in Internet of Things devices like connected toasters and TVs. And, as he describes the attack, it can turn Apple's own security chip on iPhones into a kind of "skeleton key."&lt;/p&gt;&lt;/div&gt;
      
    &lt;/div&gt;    
    &lt;div class="meta link clearfix"&gt;
      &lt;div class="comment"&gt;
                  &lt;span class="lowercase"&gt;no&lt;/span&gt;comment
                    
      &lt;/div&gt;
              &lt;div class="share text-center show-for-medium"&gt;
          &lt;span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/apple-struggling-stop-skeleton-key-hack-home-wi-fi" data-a2a-title="Apple Is Struggling To Stop A 'Skeleton Key' Hack On Home Wi-Fi"&gt;&lt;a class="a2a_button_facebook"&gt;&lt;span class="fa fa-facebook"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_twitter"&gt;&lt;span class="fa fa-twitter"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_linkedin"&gt;&lt;span class="fa fa-linkedin"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_email"&gt;&lt;span class="fa fa-envelope"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
        &lt;/div&gt;
            &lt;div class="read-more"&gt;&lt;a href="https://news.hitb.org/content/apple-struggling-stop-skeleton-key-hack-home-wi-fi"&gt;&lt;span class="lowercase"&gt;→&lt;/span&gt;READ MORE&lt;/a&gt;&lt;/div&gt; 
    &lt;/div&gt;
  &lt;/article&gt;</description>
  <pubDate>Thu, 26 Apr 2018 12:30:01 +0000</pubDate>
    <dc:creator>l33tdawg</dc:creator>
    <guid isPermaLink="false">54474 at https://news.hitb.org</guid>
    </item>
<item>
  <title>How Android Phones Hide Missed Security Updates From You</title>
  <link>https://news.hitb.org/content/how-android-phones-hide-missed-security-updates-you</link>
  <description>    &lt;article data-history-node-id="54471" role="article" class="node article teaser clearfix UTF-8"&gt;&lt;header&gt;&lt;h2 class="title text-center"&gt;&lt;a href="https://news.hitb.org/content/how-android-phones-hide-missed-security-updates-you" rel="bookmark"&gt;&lt;span&gt;How Android Phones Hide Missed Security Updates From You&lt;/span&gt;
&lt;/a&gt;&lt;/h2&gt;
       
      &lt;div class="meta submit clearfix"&gt;
        &lt;div class="date text-right"&gt;
          &lt;span class="lowercase"&gt;posted on&lt;/span&gt;April 24, 2018
        &lt;/div&gt;
        &lt;div class="author"&gt;
                            
          &lt;span class="lowercase"&gt;by&lt;/span&gt; &lt;span&gt;&lt;span&gt;l33tdawg&lt;/span&gt;&lt;/span&gt;

        &lt;/div&gt;
      &lt;/div&gt;      
    &lt;/header&gt;&lt;div class="image-default"&gt;
        
            &lt;div&gt;  &lt;a href="https://news.hitb.org/content/how-android-phones-hide-missed-security-updates-you" hreflang="en"&gt;&lt;img loading="lazy" src="https://news.hitb.org/sites/default/files/styles/medium/public/2018-04/AndroidSecurity-91620751.jpg?itok=8BvMXYf8" width="220" height="165" alt="https://media.wired.com/photos/5acd6226ca7afd490baac198/master/w_1164,c_limit/AndroidSecurity-91620751.jpg" /&gt;&lt;/a&gt;
&lt;/div&gt;
      &lt;div class="image-credit"&gt;
        &lt;strong&gt;Credit:&lt;/strong&gt;
                  &lt;a href="https://media.wired.com/photos/5acd6226ca7afd490baac198/master/w_1164,c_limit/AndroidSecurity-91620751.jpg" target="_blank"&gt;https://media.wired.com/photos/5acd6226ca7afd490baac198/master/w_1164,c_limit/AndroidSecurity-91620751.jpg&lt;/a&gt;
              &lt;/div&gt;
      
      &lt;/div&gt;
     
    &lt;div class="content"&gt;
      
            &lt;div&gt;&lt;p&gt;Google has long struggled with how best to get dozens of Android smartphone manufacturers—and hundreds of carriers—to regularly push out security-focused software updates. But when one German security firm looked under the hood of hundreds of Android phones, it found a troubling new wrinkle: Not only do many Android phone vendors fail to make patches available to their users, or delay their release for months; they sometimes also tell users their phone's firmware is fully up to date, even while they've secretly skipped patches.&lt;/p&gt;&lt;/div&gt;
      
    &lt;/div&gt;    
    &lt;div class="meta link clearfix"&gt;
      &lt;div class="comment"&gt;
                  &lt;span class="lowercase"&gt;no&lt;/span&gt;comment
                    
      &lt;/div&gt;
              &lt;div class="share text-center show-for-medium"&gt;
          &lt;span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/how-android-phones-hide-missed-security-updates-you" data-a2a-title="How Android Phones Hide Missed Security Updates From You"&gt;&lt;a class="a2a_button_facebook"&gt;&lt;span class="fa fa-facebook"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_twitter"&gt;&lt;span class="fa fa-twitter"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_linkedin"&gt;&lt;span class="fa fa-linkedin"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_email"&gt;&lt;span class="fa fa-envelope"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
        &lt;/div&gt;
            &lt;div class="read-more"&gt;&lt;a href="https://news.hitb.org/content/how-android-phones-hide-missed-security-updates-you"&gt;&lt;span class="lowercase"&gt;→&lt;/span&gt;READ MORE&lt;/a&gt;&lt;/div&gt; 
    &lt;/div&gt;
  &lt;/article&gt;</description>
  <pubDate>Tue, 24 Apr 2018 19:50:56 +0000</pubDate>
    <dc:creator>l33tdawg</dc:creator>
    <guid isPermaLink="false">54471 at https://news.hitb.org</guid>
    </item>
<item>
  <title>JPMorgan’s Blockchain Chief Amber Baldet Steps Down for Her Own Project</title>
  <link>https://news.hitb.org/content/jpmorgans-blockchain-chief-amber-baldet-steps-down-her-own-project</link>
  <description>    &lt;article data-history-node-id="54435" role="article" class="node article teaser clearfix UTF-8"&gt;&lt;header&gt;&lt;h2 class="title text-center"&gt;&lt;a href="https://news.hitb.org/content/jpmorgans-blockchain-chief-amber-baldet-steps-down-her-own-project" rel="bookmark"&gt;&lt;span&gt;JPMorgan’s Blockchain Chief Amber Baldet Steps Down for Her Own Project&lt;/span&gt;
&lt;/a&gt;&lt;/h2&gt;
       
      &lt;div class="meta submit clearfix"&gt;
        &lt;div class="date text-right"&gt;
          &lt;span class="lowercase"&gt;posted on&lt;/span&gt;April 7, 2018
        &lt;/div&gt;
        &lt;div class="author"&gt;
                            
          &lt;span class="lowercase"&gt;by&lt;/span&gt; &lt;span&gt;&lt;span&gt;l33tdawg&lt;/span&gt;&lt;/span&gt;

        &lt;/div&gt;
      &lt;/div&gt;      
    &lt;/header&gt;&lt;div class="image-default"&gt;
        
            &lt;div&gt;  &lt;a href="https://news.hitb.org/content/jpmorgans-blockchain-chief-amber-baldet-steps-down-her-own-project" hreflang="en"&gt;&lt;img loading="lazy" src="https://news.hitb.org/sites/default/files/styles/medium/public/2018-04/amber-baldet.jpg?itok=NClX9uyq" width="220" height="147" alt="https://www.coinspeaker.com/wp-content/uploads/2017/11/amber-baldet.jpg" /&gt;&lt;/a&gt;
&lt;/div&gt;
      &lt;div class="image-credit"&gt;
        &lt;strong&gt;Credit:&lt;/strong&gt;
                  &lt;a href="https://www.coinspeaker.com/wp-content/uploads/2017/11/amber-baldet.jpg" target="_blank"&gt;https://www.coinspeaker.com/wp-content/uploads/2017/11/amber-baldet.jpg&lt;/a&gt;
              &lt;/div&gt;
      
      &lt;/div&gt;
     
    &lt;div class="content"&gt;
      
            &lt;div&gt;&lt;p&gt;&lt;em&gt;&lt;strong&gt;L33tdawg:&lt;/strong&gt; Excited to see Amber's &lt;a href="https://conference.hitb.org/hitbsecconf2018ams/sessions/closing-keynote-blockchain-yes-you-can-just-use-a-database-until-you-cant/"&gt;closing keynote at #HITB2018AMS&lt;/a&gt; next week!&lt;/em&gt;&lt;/p&gt;&lt;/div&gt;
      
    &lt;/div&gt;    
    &lt;div class="meta link clearfix"&gt;
      &lt;div class="comment"&gt;
                  &lt;span class="lowercase"&gt;no&lt;/span&gt;comment
                    
      &lt;/div&gt;
              &lt;div class="share text-center show-for-medium"&gt;
          &lt;span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/jpmorgans-blockchain-chief-amber-baldet-steps-down-her-own-project" data-a2a-title="JPMorgan’s Blockchain Chief Amber Baldet Steps Down for Her Own Project"&gt;&lt;a class="a2a_button_facebook"&gt;&lt;span class="fa fa-facebook"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_twitter"&gt;&lt;span class="fa fa-twitter"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_linkedin"&gt;&lt;span class="fa fa-linkedin"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_email"&gt;&lt;span class="fa fa-envelope"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
        &lt;/div&gt;
            &lt;div class="read-more"&gt;&lt;a href="https://news.hitb.org/content/jpmorgans-blockchain-chief-amber-baldet-steps-down-her-own-project"&gt;&lt;span class="lowercase"&gt;→&lt;/span&gt;READ MORE&lt;/a&gt;&lt;/div&gt; 
    &lt;/div&gt;
  &lt;/article&gt;</description>
  <pubDate>Sat, 07 Apr 2018 05:28:17 +0000</pubDate>
    <dc:creator>l33tdawg</dc:creator>
    <guid isPermaLink="false">54435 at https://news.hitb.org</guid>
    </item>
<item>
  <title>Establishing covert communication channels by abusing GSM AT commands</title>
  <link>https://news.hitb.org/content/establishing-covert-communication-channels-abusing-gsm-commands</link>
  <description>    &lt;article data-history-node-id="54426" role="article" class="node article teaser clearfix UTF-8"&gt;&lt;header&gt;&lt;h2 class="title text-center"&gt;&lt;a href="https://news.hitb.org/content/establishing-covert-communication-channels-abusing-gsm-commands" rel="bookmark"&gt;&lt;span&gt;Establishing covert communication channels by abusing GSM AT commands&lt;/span&gt;
&lt;/a&gt;&lt;/h2&gt;
       
      &lt;div class="meta submit clearfix"&gt;
        &lt;div class="date text-right"&gt;
          &lt;span class="lowercase"&gt;posted on&lt;/span&gt;April 5, 2018
        &lt;/div&gt;
        &lt;div class="author"&gt;
                            
          &lt;span class="lowercase"&gt;by&lt;/span&gt; &lt;span&gt;&lt;span&gt;l33tdawg&lt;/span&gt;&lt;/span&gt;

        &lt;/div&gt;
      &lt;/div&gt;      
    &lt;/header&gt;&lt;div class="image-default"&gt;
        
            &lt;div&gt;  &lt;a href="https://news.hitb.org/content/establishing-covert-communication-channels-abusing-gsm-commands" hreflang="en"&gt;&lt;img loading="lazy" src="https://news.hitb.org/sites/default/files/styles/medium/public/2018-04/gsm.jpg?itok=h1Bwx2_Y" width="220" height="124" alt="https://www.helpnetsecurity.com/images/posts2018/gsm.jpg" /&gt;&lt;/a&gt;
&lt;/div&gt;
      &lt;div class="image-credit"&gt;
        &lt;strong&gt;Credit:&lt;/strong&gt;
                  &lt;a href="https://www.helpnetsecurity.com/images/posts2018/gsm.jpg" target="_blank"&gt;https://www.helpnetsecurity.com/images/posts2018/gsm.jpg&lt;/a&gt;
              &lt;/div&gt;
      
      &lt;/div&gt;
     
    &lt;div class="content"&gt;
      
            &lt;div&gt;&lt;p&gt;Security research often starts as a hobby project, and Alfonso Muñoz’s and Jorge Cuadrado’s probe into mobile privacy is no exception.&lt;/p&gt;
&lt;p&gt;The duo, who’s scheduled to reveal the results of their research at the &lt;a href="https://conference.hitb.org/hitbsecconf2018ams/" rel="noopener" target="_blank"&gt;Hack in the Box Conference in Amsterdam&lt;/a&gt; next week, ended up finding a way to establishing covert communication channels over GSM by abusing GSM AT commands.&lt;/p&gt;&lt;/div&gt;
      
    &lt;/div&gt;    
    &lt;div class="meta link clearfix"&gt;
      &lt;div class="comment"&gt;
                  &lt;span class="lowercase"&gt;no&lt;/span&gt;comment
                    
      &lt;/div&gt;
              &lt;div class="share text-center show-for-medium"&gt;
          &lt;span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/establishing-covert-communication-channels-abusing-gsm-commands" data-a2a-title="Establishing covert communication channels by abusing GSM AT commands"&gt;&lt;a class="a2a_button_facebook"&gt;&lt;span class="fa fa-facebook"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_twitter"&gt;&lt;span class="fa fa-twitter"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_linkedin"&gt;&lt;span class="fa fa-linkedin"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_email"&gt;&lt;span class="fa fa-envelope"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
        &lt;/div&gt;
            &lt;div class="read-more"&gt;&lt;a href="https://news.hitb.org/content/establishing-covert-communication-channels-abusing-gsm-commands"&gt;&lt;span class="lowercase"&gt;→&lt;/span&gt;READ MORE&lt;/a&gt;&lt;/div&gt; 
    &lt;/div&gt;
  &lt;/article&gt;</description>
  <pubDate>Thu, 05 Apr 2018 06:30:07 +0000</pubDate>
    <dc:creator>l33tdawg</dc:creator>
    <guid isPermaLink="false">54426 at https://news.hitb.org</guid>
    </item>
<item>
  <title>#HITB2018AMS Ethereum-taal Solidity: toegankelijk maar complex </title>
  <link>https://news.hitb.org/content/hitb2018ams-ethereum-taal-solidity-toegankelijk-maar-complex</link>
  <description>    &lt;article data-history-node-id="54399" role="article" class="node article teaser clearfix UTF-8"&gt;&lt;header&gt;&lt;h2 class="title text-center"&gt;&lt;a href="https://news.hitb.org/content/hitb2018ams-ethereum-taal-solidity-toegankelijk-maar-complex" rel="bookmark"&gt;&lt;span&gt;#HITB2018AMS Ethereum-taal Solidity: toegankelijk maar complex &lt;/span&gt;
&lt;/a&gt;&lt;/h2&gt;
       
      &lt;div class="meta submit clearfix"&gt;
        &lt;div class="date text-right"&gt;
          &lt;span class="lowercase"&gt;posted on&lt;/span&gt;March 27, 2018
        &lt;/div&gt;
        &lt;div class="author"&gt;
                            
          &lt;span class="lowercase"&gt;by&lt;/span&gt; &lt;span&gt;&lt;span&gt;l33tdawg&lt;/span&gt;&lt;/span&gt;

        &lt;/div&gt;
      &lt;/div&gt;      
    &lt;/header&gt;&lt;div class="image-default"&gt;
        
            &lt;div&gt;  &lt;a href="https://news.hitb.org/content/hitb2018ams-ethereum-taal-solidity-toegankelijk-maar-complex" hreflang="en"&gt;&lt;img loading="lazy" src="https://news.hitb.org/sites/default/files/styles/medium/public/2018-02/ETHEREUM-ICON_Black.png?itok=ICCOPla7" width="220" height="220" alt="" /&gt;&lt;/a&gt;
&lt;/div&gt;
      &lt;div class="image-credit"&gt;
        &lt;strong&gt;Credit:&lt;/strong&gt;
                  
              &lt;/div&gt;
      
      &lt;/div&gt;
     
    &lt;div class="content"&gt;
      
            &lt;div&gt;&lt;p&gt;In een presentatie op Hack in the Box in Amsterdam &lt;a href="https://conference.hitb.org/hitbsecconf2018ams/sessions/smashing-ethereum-smart-contracts-for-fun-and-actual-profit/" rel="external" target="_blank"&gt;demonstreert&lt;/a&gt; beveiligingsonderzoekers Bernhard Mueller volgende maand hoe zijn Ethereum-codescanner &lt;a href="https://github.com/b-mueller/mythril" rel="external" target="_blank"&gt;Mythril&lt;/a&gt; in de praktijk werkt. Hij schreef de tool in Python om Etherum-code te analyseren.&lt;/p&gt;&lt;/div&gt;
      
    &lt;/div&gt;    
    &lt;div class="meta link clearfix"&gt;
      &lt;div class="comment"&gt;
                  &lt;span class="lowercase"&gt;no&lt;/span&gt;comment
                    
      &lt;/div&gt;
              &lt;div class="share text-center show-for-medium"&gt;
          &lt;span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/hitb2018ams-ethereum-taal-solidity-toegankelijk-maar-complex" data-a2a-title="#HITB2018AMS Ethereum-taal Solidity: toegankelijk maar complex "&gt;&lt;a class="a2a_button_facebook"&gt;&lt;span class="fa fa-facebook"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_twitter"&gt;&lt;span class="fa fa-twitter"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_linkedin"&gt;&lt;span class="fa fa-linkedin"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_email"&gt;&lt;span class="fa fa-envelope"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
        &lt;/div&gt;
            &lt;div class="read-more"&gt;&lt;a href="https://news.hitb.org/content/hitb2018ams-ethereum-taal-solidity-toegankelijk-maar-complex"&gt;&lt;span class="lowercase"&gt;→&lt;/span&gt;READ MORE&lt;/a&gt;&lt;/div&gt; 
    &lt;/div&gt;
  &lt;/article&gt;</description>
  <pubDate>Tue, 27 Mar 2018 15:40:12 +0000</pubDate>
    <dc:creator>l33tdawg</dc:creator>
    <guid isPermaLink="false">54399 at https://news.hitb.org</guid>
    </item>
<item>
  <title>New attack against intelligent buildings that use KNX and Zigbee networks on show at #HITB2018AMS</title>
  <link>https://news.hitb.org/content/new-attack-against-intelligent-buildings-use-knx-and-zigbee-networks-show-hitb2018ams</link>
  <description>    &lt;article data-history-node-id="54398" role="article" class="node article teaser clearfix UTF-8"&gt;&lt;header&gt;&lt;h2 class="title text-center"&gt;&lt;a href="https://news.hitb.org/content/new-attack-against-intelligent-buildings-use-knx-and-zigbee-networks-show-hitb2018ams" rel="bookmark"&gt;&lt;span&gt;New attack against intelligent buildings that use KNX and Zigbee networks on show at #HITB2018AMS&lt;/span&gt;
&lt;/a&gt;&lt;/h2&gt;
       
      &lt;div class="meta submit clearfix"&gt;
        &lt;div class="date text-right"&gt;
          &lt;span class="lowercase"&gt;posted on&lt;/span&gt;March 27, 2018
        &lt;/div&gt;
        &lt;div class="author"&gt;
                            
          &lt;span class="lowercase"&gt;by&lt;/span&gt; &lt;span&gt;&lt;span&gt;l33tdawg&lt;/span&gt;&lt;/span&gt;

        &lt;/div&gt;
      &lt;/div&gt;      
    &lt;/header&gt;&lt;div class="image-default"&gt;
        
            &lt;div&gt;  &lt;a href="https://news.hitb.org/content/new-attack-against-intelligent-buildings-use-knx-and-zigbee-networks-show-hitb2018ams" hreflang="en"&gt;&lt;img loading="lazy" src="https://news.hitb.org/sites/default/files/styles/medium/public/2018-03/tencent-hitb1.jpg?itok=JdoCQjPc" width="220" height="134" alt="https://www.helpnetsecurity.com/images/posts2018/tencent-hitb1.jpg" title="Credit: Help Net Security " /&gt;&lt;/a&gt;
&lt;/div&gt;
      &lt;div class="image-credit"&gt;
        &lt;strong&gt;Credit:&lt;/strong&gt;
                  &lt;a href="https://www.helpnetsecurity.com/images/posts2018/tencent-hitb1.jpg" target="_blank"&gt;https://www.helpnetsecurity.com/images/posts2018/tencent-hitb1.jpg&lt;/a&gt;
              &lt;/div&gt;
      
      &lt;/div&gt;
     
    &lt;div class="content"&gt;
      
            &lt;div&gt;&lt;p&gt;A great many of us are living, staying or working in “smart” buildings, relying on automated processes to control things like heating, ventilation, air conditioning, lighting, security and other operation systems. We expect those systems to work without a glitch and withstand attacks but, unfortunately, the security of these systems is still far from perfect.&lt;/p&gt;&lt;/div&gt;
      
    &lt;/div&gt;    
    &lt;div class="meta link clearfix"&gt;
      &lt;div class="comment"&gt;
                  &lt;span class="lowercase"&gt;no&lt;/span&gt;comment
                    
      &lt;/div&gt;
              &lt;div class="share text-center show-for-medium"&gt;
          &lt;span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/new-attack-against-intelligent-buildings-use-knx-and-zigbee-networks-show-hitb2018ams" data-a2a-title="New attack against intelligent buildings that use KNX and Zigbee networks on show at #HITB2018AMS"&gt;&lt;a class="a2a_button_facebook"&gt;&lt;span class="fa fa-facebook"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_twitter"&gt;&lt;span class="fa fa-twitter"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_linkedin"&gt;&lt;span class="fa fa-linkedin"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_email"&gt;&lt;span class="fa fa-envelope"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
        &lt;/div&gt;
            &lt;div class="read-more"&gt;&lt;a href="https://news.hitb.org/content/new-attack-against-intelligent-buildings-use-knx-and-zigbee-networks-show-hitb2018ams"&gt;&lt;span class="lowercase"&gt;→&lt;/span&gt;READ MORE&lt;/a&gt;&lt;/div&gt; 
    &lt;/div&gt;
  &lt;/article&gt;</description>
  <pubDate>Tue, 27 Mar 2018 05:32:17 +0000</pubDate>
    <dc:creator>l33tdawg</dc:creator>
    <guid isPermaLink="false">54398 at https://news.hitb.org</guid>
    </item>
<item>
  <title> Hacking Intelligent Buildings and a Journey into a Modern Private Hospital at #HITB2018AMS</title>
  <link>https://news.hitb.org/content/hacking-intelligent-buildings-and-journey-modern-private-hospital-hitb2018ams</link>
  <description>    &lt;article data-history-node-id="54386" role="article" class="node article teaser clearfix UTF-8"&gt;&lt;header&gt;&lt;h2 class="title text-center"&gt;&lt;a href="https://news.hitb.org/content/hacking-intelligent-buildings-and-journey-modern-private-hospital-hitb2018ams" rel="bookmark"&gt;&lt;span&gt; Hacking Intelligent Buildings and a Journey into a Modern Private Hospital at #HITB2018AMS&lt;/span&gt;
&lt;/a&gt;&lt;/h2&gt;
       
      &lt;div class="meta submit clearfix"&gt;
        &lt;div class="date text-right"&gt;
          &lt;span class="lowercase"&gt;posted on&lt;/span&gt;March 25, 2018
        &lt;/div&gt;
        &lt;div class="author"&gt;
                            
          &lt;span class="lowercase"&gt;by&lt;/span&gt; &lt;span&gt;&lt;span&gt;l33tdawg&lt;/span&gt;&lt;/span&gt;

        &lt;/div&gt;
      &lt;/div&gt;      
    &lt;/header&gt;&lt;div class="image-default"&gt;
        
            &lt;div&gt;  &lt;a href="https://news.hitb.org/content/hacking-intelligent-buildings-and-journey-modern-private-hospital-hitb2018ams" hreflang="en"&gt;&lt;img loading="lazy" src="https://news.hitb.org/sites/default/files/styles/medium/public/2018-03/smart-building-tech_1.jpg?itok=8xLmf6jq" width="220" height="135" alt="http://www.earthsafe.com/sites/default/files/smart-building-tech_1.jpg" title="Credit: EarthSafe " /&gt;&lt;/a&gt;
&lt;/div&gt;
      &lt;div class="image-credit"&gt;
        &lt;strong&gt;Credit:&lt;/strong&gt;
                  &lt;a href="http://www.earthsafe.com/sites/default/files/smart-building-tech_1.jpg" target="_blank"&gt;http://www.earthsafe.com/sites/default/files/smart-building-tech_1.jpg&lt;/a&gt;
              &lt;/div&gt;
      
      &lt;/div&gt;
     
    &lt;div class="content"&gt;
      
            &lt;div&gt;&lt;p&gt;&lt;strong&gt;Amsterdam – 24 March 2018: &lt;/strong&gt;The Industry Internet of Things (IIoT) is at the forefront of smart connected buildings. In the race to be the first to capture any slim openings in this competitive space, device manufacturers may compromise on security standards in order to release their products to market quicker.&lt;/p&gt;&lt;/div&gt;
      
    &lt;/div&gt;    
    &lt;div class="meta link clearfix"&gt;
      &lt;div class="comment"&gt;
                  &lt;span class="lowercase"&gt;no&lt;/span&gt;comment
                    
      &lt;/div&gt;
              &lt;div class="share text-center show-for-medium"&gt;
          &lt;span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/hacking-intelligent-buildings-and-journey-modern-private-hospital-hitb2018ams" data-a2a-title=" Hacking Intelligent Buildings and a Journey into a Modern Private Hospital at #HITB2018AMS"&gt;&lt;a class="a2a_button_facebook"&gt;&lt;span class="fa fa-facebook"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_twitter"&gt;&lt;span class="fa fa-twitter"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_linkedin"&gt;&lt;span class="fa fa-linkedin"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_email"&gt;&lt;span class="fa fa-envelope"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
        &lt;/div&gt;
            &lt;div class="read-more"&gt;&lt;a href="https://news.hitb.org/content/hacking-intelligent-buildings-and-journey-modern-private-hospital-hitb2018ams"&gt;&lt;span class="lowercase"&gt;→&lt;/span&gt;READ MORE&lt;/a&gt;&lt;/div&gt; 
    &lt;/div&gt;
  &lt;/article&gt;</description>
  <pubDate>Sun, 25 Mar 2018 04:50:56 +0000</pubDate>
    <dc:creator>l33tdawg</dc:creator>
    <guid isPermaLink="false">54386 at https://news.hitb.org</guid>
    </item>

  </channel>
</rss>