When it comes to cybersecurity, 2018 has not been a great year so far with the whole Facebook fiasco and numerous compromised ICOs (more on that here). There are bigger hacks that generate noise and get a lot of attention and there a few smaller ones that go unnoticed. Here's a brief round up of some breaches from last month.
Adobe Flash Player is prone to an unspecified remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Flash Player version 22.214.171.124 and prior versions are vulnerable.
ICO attacks are new normal in 2018. On an average 10 ICOs get hacked every month. Successful ICOs are all about correct execution.
Most founders do not factor in the required cyber security practices to launch tokens and end up losing millions to silly hacks. ICO startups are left with very few options after a heist.
Entersoft emerged victorious as "Best Fintech Startup of 2017" and "Outstanding Application Security Solutions Provider" at the 2017 ET NET FinTech Awards for their proactive and offensive approach with DevSecOps, which assess applications for various security loopholes.
The Internet of Things continues to connect an ever-increasing number of devices. We're heading towards a seamlessly connected world that will have 24 billion IoT devices by 2020. Connected devices are making headway into each and every aspect of our lives, including homes, offices, cars and even cities.
Entersoft Security in collaboration with IOT Forum India and TiE Bangalore conducted IOT Hackfest on 7th November 2017 at the TiE Bangalore office.
In our interview for this month, we venture into one of the most trending topics these days and try to understand a decentralized application built on the Ethereum blockchain - WandX. A brief chat with the CEO, Abhinav Ramesh to discuss cryptocurrency based assets, FinTech in India, ICO hacks and P2P trading.
Race conditions in software arise when two concurrent threads of execution access a shared resource in a way that unintentionally produces different results; depending on the time at which the code is executed. For example, a multi-threaded program may spawn 2 threads that have access to the same location in memory.