Critical PPP Daemon Flaw Opens Most Linux Systems to Remote Hackers
The Hacker News – The US-CERT today issued advisory warning users of a new dangerous 17-year-old remote code execution vulnerability affecting the PPP daemon (pppd) software that comes installed on almost all Linux based operating systems, as well as powers the firmware of many other networking devices. The affected pppd software is an implementation of Point-to-Point Protocol (PPP) that enables communication and data transfer between nodes, primarily used to establish internet links such as those over dial-up modems, DSL broadband connections, and Virtual Private Networks.
Serious security flaw in most Linux systems and TP-Link routers
adslzone – Every few weeks we have news of a serious vulnerability discovered that puts us at risk as users of certain products or services. In this case, a major security flaw has been discovered in a Point-to-Point Protocol Daemon (pppd) software . The problem with this vulnerability is that it has been present for 17 years and no one had located it until now, allowing arbitrary code to be executed on the affected devices or systems (or malware ) to take control of them. Most Linux systems, some routers and TP-Link or OpenWRT network devices are affected.
International Women’s Day 2020: Gains made in cybersecurity but the job is not done
SC Magazine – For the cybersecurity industry International Women’s Day 2020 may be somewhat bittersweet as more women are working in the industry, but when it comes to full equality the work is far from complete. The 2020 edition of this day does find more women working in cybersecurity with about 20 percent of the workforce being female, up from an estimated 11 percent just a few years ago, according to Cybersecurity Ventures, but there is still a great deal of work to be done. “It’s important to have strong female role…
How Secure Is Your LoRaWAN IoT Device?
EE Times – Low-power wide-area networks (LPWANs) are helping drive the Internet of things (IoT) explosion. They connect millions of low-power IoT and Industrial IoT (IIoT) devices into wireless networks over a range of distances, from short to really, really long, from indoor applications to those covering large fields or even cities. But device designers using the LoRaWAN standard may be lulled into thinking that just configuring its security keys is enough to prevent their devices from being hacked. A new report says it isn’t.
Key management concerns impact LoRaWAN IoT device security
Embedded – Low-power wide-area networks (LPWANs) are helping drive the Internet of things (IoT) explosion. They connect millions of low-power IoT and Industrial IoT (IIoT) devices into wireless networks over a range of distances, from short to really, really long, from indoor applications to those covering large fields or even cities. But device designers using the LoRaWAN standard may be lulled into thinking that just configuring its security keys is enough to prevent their devices from being hacked. A new report says it isn’t.