New Attacks Against SCADA, ICS, and Industrial Safety Control Systems

This can’t be good.  Klaxons sounding at the chemical plant only meant one thing, that the automatic safety systems were not working and that a dangerous explosion was immanent.  The explosion would release a toxic cloud of hydrogen sulfide gas that would kill everyone at the plant and hundreds of people living nearby.

A movie scene?  A spy novel plot?  Unfortunately not, this is an actual event that took place in Saudi ...

Continue Reading →
0

Personal and Business Uses for Keyloggers.

Would you like to use a keylogger to spy on your spouse?  How about your kids?  Is it legal?  Can an employer use a keylogger to monitor employee computer activity in the workplace?

Usually, when I am discussing keyloggers, it is the kind of keylogger a cyber-criminal would use, and how to keep them off our computer.  Today we are looking at this from another angle.

A keylogger, if you don’t know, is ...

Continue Reading →
0

Cybersecurity Basics for Small Businesses

If you are a small business owner or manager, you have a target on your back.   You face a special set of risks from cyber-crime exploits.  Most often, you do not have the financial resources to afford a full time IT support employee.  You do not have the budget for expensive Intrusion Prevention Systems (IPS), or Security Information and Event Management (SIEM) systems.  You might not even have a firewall, or ...

Continue Reading →
0

Cybersecurity Basics

It’s April Fools Day, and in honor of those people who are still trading away safety for convenience when working with a computer or online, we have a short list of simple and basic security methods.  If you are someone who provides “tech support” for a family member or are the “go-to” unofficial tech support in a small business, this is a good place to start.

Behaviors

This is simple stuff, but important, ...

Continue Reading →
1

The NSA Releases Reverse Engineering Tool

Here’s a kick in the head.  Your tax dollars at work in a way that may save you a bunch of money.  The National Security Agency has voluntarily released a software reverse engineering tool called Ghidra at the RSA security conference.  The NSA has been using this tool internally to take apart and analyze malicious code, and to find vulnerabilities in commercial software ...

Continue Reading →
0

Docker Vulnerability Allows Crypto-Miner Access

If you are running a fleet of virtual machines using popular containerization solution Docker, you may be in for a nasty surprise.  A couple of vulnerabilities have been discovered in Docker that has been exploited by cyber-criminals to run the Monero crypto-currency miner on affected Docker containers.  This will of course have a serious impact on performance, and in an environment where billing is usage based, this will increase your costs.

Security ...

Continue Reading →
0

WyzGuys the the Press

I am showing up online in places other than this blog, and I wanted to share two of the most recent mentions.

I was interviewed for an articles in Financier World magazine, and the article appears in the April 2019 issue.  The article is titled Cyber posture: the value proposition of security.

I recently reported on New WordPress Security Options, and my article was picked up and republished by ...

Continue Reading →
0

Technology Milestones In The News

This month marks the 30th anniversary of the World Wide Web.  It is also the 50th anniversary of the Apollo space flight missions to the moon and back.  More recently, the successful unmanned mission by the Space-X Crewed Dragon command module to the International Space Station, we finally see space flight becoming a business as opposed to being strictly a governmental exercise.

The underlying protocol of the web, and really all networking, ...

Continue Reading →
0

Skynet is Closer than Ever

I think we know where this is going.  The Department of Defense is pursuing several initiatives where artificial intelligent and machine learning are being integrated with weapons systems. Remind anyone of the Terminator movies?

The official line from the DoD is: “All development and use of autonomous and semi-autonomous functions in weapon systems, including manned and unmanned platforms, remain subject to the guidelines in the Department of Defense (DoD) Directive 3000.09, which ...

Continue Reading →
0
Page 3 of 52 12345...»