What You Can Do After The Equifax Breach

The Equifax breach has been all over the news this weekend, and it should be.  This is worse than they are telling us.  It most certainly DOES affect you, if you are adult and have ever purchased a car or opened a credit card account.  Don’t wait to be told you are a victim.  Assume you are a victim.

In a world where we are all suffering from “breach fatigue,” having suffered through dozens if not hundreds of these revelations about ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Equifax Security Breach Is A Complete Disaster… And Will Almost Certainly Get Worse


‘Pulse wave’ DDoS – another way of blasting sites offline

If there’s one thing we’ve learned, it’s that any new way of DDoSing will reveal that there are a huge number of undefended devices online.


It’s baaaack: Locky ...

Continue Reading →
0

Autonomous Robotic Weapons

We already have some highly sophisticated weapons systems that use computer technology and electronics to do things on a battlefield undreamed of even a few decades ago.  This does include robotic weapons systems.  The important ingredient in all this tech is the presence of human control.  At this point in time it still takes a human to drive these war machines.

But we are not the far from being able to create ...

Continue Reading →
0

NIST Warns Against Lack of Security in Critical Infrastructure

NIST (National Institute for Standards and Technology) released Special Publication 800-53 version 4 recently, and it covers the shortcomings in privacy and security in the national power grid, water control systems, dams, oil and gas utilities and similar computer controlled systems.  There are no coherent or enforceable standards for Industrial Control Systems (ICS) and Supervisory Control And Data Acquisition (SCADA) systems that ...

Continue Reading →
0

Twitter’s #Hashtag Turns 10

I remember it as the “number sign” or the “pound sign.”  Jeopardy contestants might know it is called an “octothorpe.”  The symbol itself goes back to Roman times, and was used extensively in the telephone industry, appearing on touch tone phone keypads as a way to allow special dialing features.

First suggested by Twitter marketing guru Chris Messina as a way to group, organize, and follow an idea in the Twitter stream, it quickly became a social media staple used not ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


US-CERT: Alert (TA17-181A) Petya Ransomware

Systems Affected

Microsoft Windows operating systems

Overview

This Alert has been updated to reflect the National Cybersecurity and Communications Integration Center’s (NCCIC) analysis of the “NotPetya” malware variant.

The scope of this Alert’s analysis is limited to the newest Petya malware variant that ...

Continue Reading →
0

Weekend Update – Recent Cybersecurity Alerts

Not sure if Weekend Update is going to become a regular feature on Saturdays, but you might keep an eye out for a few more of these.  What follows is a copy and paste from alert emails I receive from the FBI, Department of Justice, FTC, and US-CERT.  Also content from other bloggers, such as Sophos Naked Security block, Brian Krebs, Bruce Schneier, WordFence blog, and others that I read and ...

Continue Reading →
0

Current Events Round-up

Seems to be a busy summer so far.  Barely finished up with WannaCry and now we are dealing with Petya.  Here are some useful links

About Petya:

I have followed with great interest the ...

Continue Reading →
0

US Cyber Command Takes on North Korean Missile Program

I read an interesting article in the New York Times earlier this month, about how the United States is using cyber-warfare tactics against North Korea to slow the development of an inter-continental ballistic missile that can reach the United States.  The effective range maps were startling.  (see below)

It seems that Trump has inherited a cyber war program from the Obama administration that was started 3 years ago and targeted the North Korean missile development program.  Since that time, there ...

Continue Reading →
0
Page 1 of 5 12345