Security and Medical Devices

Are you using an implantable medical device such as a pacemaker, defibrillator, or infusion pump?  These devices are not as secure as you might expect.  October is Cybersecurity Awareness Month, and this week’s theme is “Securing Internet connected devices in health care.”   Parts of this article appeared previously in posts from January 16, 2016 and April 11 2016.  We have come ...

Continue Reading →
0

If You Connect It, Protect It

Keeping our connected devices secure has become easier – and harder!  Easier because we have more tools to defend our online assets, and harder because the opposition has grown much larger and become more sophisticated.  And the enemy is not limited to criminals, there are terrorist groups, nation-state sponsored cyber operations teams, hacktivists, and other with malicious intent and nefarious schemes.

When I started writing this blog in October 2006, almost ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


AA20-209A: Potential Legacy Risk from Malware Targeting QNAP NAS Devices

Original release date: July 27, 2020

CISA and NCSC are investigating a strain of malware known as QSnatch, which attackers used in late 2019 to target Network Attached Storage (NAS) devices manufactured by the firm QNAP.

All QNAP NAS devices are potentially vulnerable to QSnatch malware if not ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Safety and Security While Video Conferencing with Zoom

With much of the world shifting to working from home due to public health concerns with COVID-19, video conferencing is booming. Businesses, and even schools, are turning to platforms such as Zoom, Microsoft Teams, Google hangouts and other technologies to stay connected.


5 things ...

Continue Reading →
0

Reducing Risk When Deploying IoT Devices in Business

The Internet of Things (IoT) has given us a plethora of exciting and helpful computer driven devices.  But the state of IoT security remains a dumpster fire.  As these devices appear in the workplace, businesses are often failing to consider the impact these poorly secured devices have on their carefully crafted cybersecurity programs.  Every one of these devices represents a ...

Continue Reading →
0

Infographic – The Internet of Hackable Things in Your Daily Life

Today I share an infographic provided by repeat guest poster Siege Media.  The Internet of Things is full of cool new devices that connect to the network and Internet, and can be used from distant locations.  But if used without proper security controls, these smart devices can provide an easy remote entry point for an attacker.

I have not republished the excellent article that was part of the original post, 

Continue Reading →
1

Guest Post – How to Use Your Laptop’s Bluetooth Connection Securely

Using Bluetooth to connect devices to your laptop is convenient but also risky. Discover what those risks are and how to minimize them.

Many laptops come with Bluetooth connectivity. Thanks to this wireless technology, you can easily connect a keyboard, mouse, headset, or other peripheral to your laptop. You can even use it to send files to a printer ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


UL Pushes Security Standards For The Internet Of Broken Things

from the internet-of-very-broken-things dept

If you hadn’t noticed yet, the internet of things is a security and privacy shit show. Millions of poorly-secured internet-connected devices are now being sold annually, introducing massive new attack vectors and vulnerabilities into home and business networks nationwide. Thanks to IOT companies ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


FTC warns Christmas buyers that smart toys are a security risk

Thinking of giving a young person an internet-connected ‘smart’ toy this Christmas? You may want to think again.


Targeting Military Veterans: 5 Ways Cybercriminals Are Scamming Them

They trained, they served, they protected us. Now, they’re being targeted by cybercriminals who prey ...

Continue Reading →
0
Page 1 of 10 12345...»