(Bloomberg) — Want to receive this post in your inbox every day? Sign up for the Balance of Power newsletter, and follow Bloomberg Politics on Twitter and Facebook for more.
Hello and welcome back to Startups Weekly, a weekend newsletter that dives into the week’s noteworthy startups and venture capital news. Before I jump into today’s topic, let’s catch up a bit. Last week, I wrote about the differences between raising cash from angels and traditional venture capitalists. Before that, I summarized DoorDash’s acquisition of Caviar.
The Wall Street Journal on Friday, refuting the publication’s bombshell report describing how China’s tech giant allegedly helped the governments of two African nations spy on their political opponents.” data-reactid=”18″>Huawei Technologies sent a letter to The Wall Street Journal on Friday, refuting the publication’s bombshell report describing how China’s tech giant allegedly helped the governments of two African nations spy on their political opponents.
Sebastien Roblin” data-reactid=”18″>Sebastien Roblin
Bertil Lintner” data-reactid=”18″>Bertil Lintner
The results were not encouraging. Time and again, firmware from commonly used manufacturers failed to implement basic security features even when researchers studied the most recent versions of the firmware. For example: firmware for the ASUS RT-AC55U wifi router did not employ ASLR or stack guards to protect against buffer overflow attacks. Nor did it employ a non-executable stack to protect against “stack smashing,” another variety of overflow attack. CITL found the same was true of firmware for Ubiquiti’s UAP AC PRO wireless access points, as well as DLink’s DWL-6600 access point. Router firmware by vendors like Linksys and NETGEAR performed only slightly better on CITL’s assessment.
In just our first year since being spun out of Centrify, Idaptive is named a Visionary in the Gartner 2019 Magic Quadrant for Access Management.
James Holmes” data-reactid=”18″>James Holmes
*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.youtube-nocookie.com/embed/b-800ROOlHo
The Daily Crunch is TechCrunch’s roundup of our biggest and most important stories. If you’d like to get this delivered to your inbox every day at around 9am Pacific, you can subscribe here.
Apple announced last week that it was willing to pay up to $1.5 million for iPhone bugs, and that it will give security researchers special devices so they can find more vulnerabilities in iOS.
August 16, 2019 • Ellen Wilson
If you attended Black Hat 2019 in Las Vegas last week, you may have noticed a new interactive game at the Recorded Future booth: Ready Set Intelligence.
At FLIGHT Boston 2019, we’ll have two full-day product training sessions, tracks in AppSec, open source, and DevOps and cloud, and plenty of networking.
At Black Hat USA, Project Zero’s team lead shared details of projects it has accomplished and its influence on the security community.
Price: Based on number of assets
—–BEGIN PGP SIGNED MESSAGE—–
Kevin J. McNamara” data-reactid=”22″>Kevin J. McNamara
This year’s Def Con—the world’s biggest hacking conference—was more sprawling than ever. Held annually in Las Vegas, the conference has grown over the last 27 years from a small gathering of hackers huddled into the Alexis Park hotel to a nearly 30,000-person swarm spread across multiple hotels on the Strip.
This is a questions I get fairly often. But before I try to answer, let’s take a step back: