More On The Robot Question

The Singularity.  Artificial Intelligence.  Self-aware, self-actuating, and self-learning robots.  What will our future be like when the machines become self-aware?  Will it be the like the T-1000 from Terminator?  Or more like Johnny 5 from Short Circuit?  Or Andrew from Bicentennial Man?  Here is a run-down of four different versions of our electronic and digital future.

A recent book by Martin Ford, Rise of Robots: Technology and the Threat of a Jobless Future, examines a world in the all ...

Continue Reading →
0

Cybersecurity Jobs In Demand

CEH-logoIf you are in high school (or junior high) or college, attracted to technology, and looking for a career with a future, then you should give serious consideration to the field of Cybersecurity.  A recent press release from Cybrary reveals the results of  its Cyber Security Job Trends Survey for 2016.  Cybrary surveyed 435 senior level technology professionals, and the results indicated a pressing need for more skilled cybersecurity ...

Continue Reading →
0

Cybersecurity Awareness Training

employee_trainingLast week we took an in depth look at social engineering, and looked a phone and email examples in depth.

Cybersecurity awareness training is one of the most effective ways to combat these threats. Not everyone engaged in cybersecurity practice agrees about the effectiveness of this solution, but I have been delivering public cybersecurity courses for over a decade, and I know from the responses that ...

Continue Reading →
0

Phishing and Spearphishing – Don’t Take The Bait!

Phishing HookHere’s a provocative statement:  If you could just prevent your staff for clicking on links or opening attachments in phishing emails, 95% of your cybersecurity problems would be prevented.

As perimeter defenses and anti-malware software products have become more effective, cyber-attackers have turned to the phishing email approach as their number one favorite method for acquiring user names and passwords or gaining unauthorized access to computers on your network.   The spearphishing ...

Continue Reading →
0

What Is Social Engineering?

social-engineeringThis should really be called “anti-social” engineering.  A good definition is “social engineering is a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. It is one of the greatest threats that organizations today encounter.”

My article on Wednesday will give an example of phone based social engineering – the fake tech support call. ...

Continue Reading →
0

Perils From The Edge – A Solution

turris-onamiaThere is a small company in the Czech Republic called Turris that developed a home and small office wireless router that may be the most secure small router available.  That is – when it’s available in April.  Right now its an Indegogo project.  You can pre-order it now for about $200.

This is an open-source project running OpenWrt.  According to the manufacturer, the router will be available in several ...

Continue Reading →
0

Perils From The Edge – Home Routers

ubiquitiMonday we looked at issues with the business class routers at Juniper Networks and Cisco Systems.  Today we are going to look at an exploit affecting the Ubiquiti brand of cable modems.

Cable and DSL “modems” are used by most consumers, and many small businesses to connect their home or business network to the Internet.  These “modems” are really routers.

(It has been a personal pet peave of mine that these devices were called modems ...

Continue Reading →
0

Perils From The Edge – Insecure Routers

juniper-networksAt the end of December last year Juniper Networks discovered that some malicious actors had added code to the firmware and software that run their routers, creating a back door that would allow attackers to access the router remotely, assume administrator privileges, and view and decrypt VPN traffic running through the routers.  As the story unfolded, it turns out that Juniper was using a random number generator from NIST, and that the Continue Reading →

0
Page 42 of 55 «...1020304041424344...»