Autonomous Vehicles Will Decide Who Gets Killed

In a not too distant future, you may be riding in an autonomous vehicle that is forced to decide between running over a pedestrian or a bicyclist.  Or whether to crash into a tree or another automobile.  It may make a decision you are not particularly happy with.  These decisions will rely on “artificial intelligence” built into these cars.  These decisions are being programmed right now by developers of autonomous vehicles.  ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Tiny Hardware Firewall VPN Client

Here are a couple of tiny, portable security devices that provide hardware firewall, VPN, and TOR capability.  Check them out.


FTC Releases Cyber Resources for Small Businesses

10/25/2018 09:15 PM EDT  Original release date: October 25, 2018

The Federal Trade Commission (FTC) has ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


[INFOGRAPHIC] Introducing The Psychology of Passwords

From LastPass – It feels like almost every day there’s another data breach in the news, or a case of user credentials up for sale on the Dark Web. Despite the headlines, and repeated warnings from experts about weak passwords and the dangers of password reuse, users have yet to change their online ...

Continue Reading →
0

Preventing the Next VPN Filter Bot-Net Attack

Back on May 30, 2018 the FBI asked us all to reboot our Internet access devices, the cable and DSL modems that allow most of us to use the Internet.  Supposedly, this would remove the VPN Filter malware, if our router was infected.  This was not exactly the truth.  The FBI had taken over the “toknowall” command and control server for ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Windows 10 security can be bypassed by Settings page weakness

The file type used by Windows 10’s settings page can be used to trick Windows into running files it’s supposed to block.


Here are the 4 best ways to train employees for better cybersecurity

87% of companies experienced an ...

Continue Reading →
0

WPA3 Encryption to Improve Wi-Fi Security

With the expanded use of wireless networks connecting business computers, home computers, smartphone and tablets, and the ever expanding list of smart IoT devices, strong wireless network security is more important than ever.  Fortunately there is a new wireless security protocol, WPA3, that will fix some of the weaknesses inherent in the current standard, WPA2.

Wireless security is all about ...

Continue Reading →
0

Securing Networking Infrastructure Against Global Threats

Just how secure are the servers, routers and other high end hardware that is running the global Internet?  This is a question posed in a pair of recent articles from US-CERT, the US Computer Emergency Readiness Team.

Because of the significant skills and capabilities of organized cyber-criminals, politically motivated hacker collectives, nation-state cyber armies and similar threat sources, operators of global network systems face ...

Continue Reading →
0
Page 1 of 7 12345...»