Today’s bash bug is as big a deal as Heartbleed. That’s for many reasons. The first reason is that the bug interacts with other software in unexpected ways. We know that interacting with the shell is dangerous, but we write code that does it anyway.
It’s been just two months since researcher Karsten Nohl demonstrated an attack he called BadUSB to a standing-room-only crowd at the Black Hat security conference in Las Vegas, showing that it’s possible to corrupt any USB device with insidious, undetectable malware.
More than 12 million devices running an embedded webserver called RomPager are vulnerable to a simple attack that could give a hacker man-in-the-middle position on traffic going to and from home routers from just about every leading manufacturer.
Thank you for visiting USSPI. The U.S. Strategic Perspective Institute is an independent, non-partisan, 501(c)3 non-profit, public policy think tank devoted to helping America solve some of its toughest operational problems including jobs, international competition, healthcare, the environment, government transparency, and cybersecurity.
Please join our mailing list. If you subscribe, you will be asked to confirm your subscription. You promise to contact you only when it is important. You will be able to unsubscribe at any time.
This form will only be shown once during this session. Thanks!