What the Heck is the Bump Card?

A professional associate of mine alerted me to the Bump Card.  The fundamental concept seems to make sense; replace the business card with a phone app that allows you to exchange professional information including links to your web site, or even a special purpose web page.  This exchange happens over your near-field communications (NFC) radio in your phone.  This can be phone-to-phone, ...

Continue Reading →
9

Can Your Wireless Keyboard Be Hacked?

Did you know that wireless devices almost always present a security vulnerability?  Wireless signals pass through the air and can be intercepted and read by a savvy attacker.  To protect wireless communication sessions, usually the wireless link is protected with some form of encryption.  Last week I was teaching a CISSP class, and we were discussing the security vulnerabilities inherent in wireless networking, when one of the students asked if wireless keyboards are secure.  The research I did while answering ...

Continue Reading →
0

When Encryption Is A Crime Only Criminals Will Have Encryption

As we enter the silly season of another Presidential Election, and possibly because of a psychological condition that I am calling COVID Mania*, the government is once again making boneheaded moves to introduce and pass legislation that would allow the federal government and law enforcement agencies easier access to encrypted messages from criminal sources.  This issue comes up every five to ten years.  It seems that agencies such as the ...

Continue Reading →
1

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


US Department of Justice reignites the Battle to Break Encryption

Every 5 to 10 years, the government and law enforcement agencies try to pass a law that provides easy access or a “back door” to encryption keys because criminals use encryption and this makes arrest and prosecution harder.  The problem is that anything that weakens encryption for criminals weakens ...

Continue Reading →
0

Telehealth and Healthcare Security Resources

Are you concerned about telemedicine and healthcare security?  Today’s article provides a list of resources from the National Cyber Security Alliance.

The convergence of the internet and healthcare has created many benefits for patients and healthcare providers, but has also created vulnerabilities that cyber criminals regularly attempt to exploit. Download NCSA’s Week 3 infographic and video to learn some of the most common ways patients and medical practitioners ...

Continue Reading →
0

Security and Medical Devices

Are you using an implantable medical device such as a pacemaker, defibrillator, or infusion pump?  These devices are not as secure as you might expect.  October is Cybersecurity Awareness Month, and this week’s theme is “Securing Internet connected devices in health care.”   Parts of this article appeared previously in posts from January 16, 2016 and April 11 2016.  We have come ...

Continue Reading →
0
Page 20 of 107 «...101819202122...»