2020 and the SSL, a small prediction exercise

Browsers and Certification Authorities, the battle continues. Image source : TheDigitalArtist via Pixabay 2019 was a busy year, with growing differences of opinion between browsers makers and Certification Authorities, an explosion in the number of phishing sites encrypted in HTTPS and significant progress on the depreciation of TLS v1.0. Discussions on extended validation, more generally the visual display of certificates in browsers, and the reduction of the duration of certificates ... Read More

The alarming Kaspersky report: nine times more attacks aiming connected objects than in 2018

Image source: TheDigitalArtist via Pixabay Last October 15, Kaspersky, the antivirus software company, published an edifying report about the volume of cyberattacks directly aiming connected objects. Although the industry expected that this new generation of objects would be directly targeted by cyberattacks, the increase in the cyberattacks number is alarming and lets easily imagine the security flaws that the connected objects present. According to the estimation presented by Kaspers... Read More

Satori Botnet: The hacker facing up to 10 years imprisonment did not act alone

Image source: TheDigitalArtist via Pixabay We now know more about the cyberpirate, Nexus Zeta, whose real name is Kenneth Currin Schuchman, who distinguished himself with the creation of the Satori botnet. Pleading guilty to the charges regarding Satori botnet creation, his confessions describe the implementation of this attack using IoT flaws. For reminder, a botnet is a set of infected computers remotely controlled by a cybercriminal. The machines that belong to a botnet are often ca... Read More

The Black swan time?

Image source: abudrian via Pixabay The actors and utility providers invade the connected world, benefiting from the innovations that the rest of the world opportunely provides them. It wouldn’t be a problem if we didn’t live in an age where hacking a power plant became possible. In 2015 and 2016, hackers shut down power to thousands of users in the middle of the Ukrainian winter. Since then, the American government openly admitted that foreign powers tried every day to take control of the... Read More

Connected objects: unavoidable in DDoS attacks?

  Nowadays consumers use and are around connected objects. The Internet of Things (IoT) includes all connected objects like a connected refrigerator, captor, light bulb, security camera, router or even a thermostat control. Their common point? To have an IP address and to be connected to communicate. According to the American company Gartner, connected objects will reach 20.5 billion units by 2020. We will face an impressive growth of IoT in the years to come. China, North America and ... Read More