Continuing where we left of last week, let’s take a look at the security of network connected medical devices. As we discussed in an earlier post, the Mayo Clinic recently sponsored a hackathon of sorts, inviting a number of security practitioners to their campus in Rochester Minnesota to see how hard it would be to hack the medical equipment. ...
APR





How would you feel if, in order to gain access to a known terrorist’s house, the government passed a law that required every lock manufacturer to create a master key that would unlock every locked door anywhere? What if the police promised that they would only use the key on the one house? What if they promised to keep the key safe and secure so it could never get into the ...
At the end of December last year Juniper Networks discovered that some malicious actors had added code to the firmware and software that run their routers, creating a back door that would allow attackers to access the router remotely, assume administrator privileges, and view and decrypt VPN traffic running through the routers. As the story unfolded, it turns out that Juniper was using a random number generator from NIST, and that the ...
