Principal Security Researcher
Tripwire

BIO:

Principal Security Researcher

Articles and Comments By Craig Young

Expert Commentary
Hackers Use Zero-day To Mass-wipe My Book Live Devices
July 01 , 2021 by Craig Young
This is a particularly interesting case because we don’t often see widespread zero-day attacks lik...
Expert Commentary
FreakOut Botnet Targets Linux- Experts Offer Perspective
January 20 , 2021 by Craig Young
The commoditization of malware has absolutely lowered the bar for those looking to snoop or steal bu...
Expert Commentary
Massive Fraud Operation Facilitated By Evil Mobile Emulator Steals Millions From Banks
December 18 , 2020 by Craig Young
While there are various things consumers can do to reduce their likelihood of becoming a victim of s...
Expert Commentary
Two-Factor Authentication Bypass Flaw Affects 70 Million+ Domains
November 26 , 2020 by Craig Young
cPanel’s 2-factor authentication could be bypassed because it did not lock users out for failed at...
Expert Commentary
Security Blueprints Of Many Companies Leaked In Hack Of Swedish Firm Gunnebo - Experts Reaction
October 29 , 2020 by Craig Young
Groups like REvil and Maze have been wildly successful at monetizing data exfiltrated from their vic...
Expert Commentary
Experts On Apps For Children Must Offer Privacy By Default
September 03 , 2020 by Craig Young
Although it may not always be obvious, the small bits of data people generate with online activities...
Expert Commentary
Expert Advise on Home Routers Largely Unpatched
July 07 , 2020 by Craig Young
I’m absolutely stunned that they would assess that Netgear and ASUS do a better job than others. O...
Expert Commentary
Expert Insight On CallStranger Vulnerability Lets Attacks Bypass Security Systems And Scan LANs
June 09 , 2020 by Craig Young
As the researcher noted, UPnP was effectively designed from the ground up without security. Although...
Expert Commentary
Researchers Find Bug Existing Since iOS 13.3.1 Which Interferes With VPNs Encrypting Traffic
March 30 , 2020 by Craig Young
This kind of bug could be a big concern for people who rely on VPN technology for privacy. In this s...
Expert Commentary
Scanning For Ghostcat - Expert Reaction
March 04 , 2020 by Craig Young
This is an interesting situation because Apache JServ Protocol (AJP) connections should absolutely n...
Expert Commentary
Cypress WiFi Chips Leak Sensitive Info Due To Kr00k Bug In Broadcom - Experts Insight
February 27 , 2020 by Craig Young
Researchers from ESET have identified yet another widespread privacy concern related to faulty WPA2...
Expert Commentary
Jeff Bezos' Phone Hacked By Saudi Crown Prince - Expert Comments
January 23 , 2020 by Craig Young
Based on the publicly available details, the attack most likely exploited WhatsApp CVE-2019-11931 us...
Expert Commentary
FBI Warns About Snoopy Smart TVs Spying On You - Expert Advise
December 04 , 2019 by Craig Young
Smart TVs are more often than not vulnerable to various cross-site attacks where remote web sites ca...
Expert Commentary
21 Million Logins For Top 500 Firms Offered On The Dark Web
October 31 , 2019 by Craig Young
This is an interesting glimpse into the inner-workings of underground criminal hacking markets. It i...
Expert Commentary
Experts Comment: Attackers Exploit 0-Day Vulnerability That Gives Full Control Of Android Phones
October 08 , 2019 by Craig Young
The real irony of this situation is that Google’s own automated bug hunting tools found the kernel...
Expert Commentary
Comment: Magecart Skimmers Found Targeting Routers For Customer Wi-Fi Networks
September 26 , 2019 by Craig Young
Injecting JavaScript payloads into the connections of unsuspecting hotel guests is a huge win for sc...
Expert Commentary
125 New Flaws Found In Routers And NAS Devices From Popular Brands
September 17 , 2019 by Craig Young
Although some are looking at this report and claiming it is an indicator of worsening IoT security,...
Expert Commentary
Android Trojan Infects Tens Of Thousands Of Devices In 4 Months
August 29 , 2019 by Craig Young
Trojan droppers are commonly used in Android malware due to their effectiveness in sneaking maliciou...
Expert Commentary
Microsoft Contractors Listened To Xbox Owners In Their Homes
August 23 , 2019 by Craig Young
Incidents like this are a good reminder of the risk inherent in virtually all cloud-driven IoT syste...
Expert Commentary
IoT Camera Exploit Allows Attackers To Listen In Over HTTP
August 02 , 2019 by Craig Young
It is generally unwise to configure any security cameras to be accessed directly across the Internet...