Autonomous Robotic Weapons

We already have some highly sophisticated weapons systems that use computer technology and electronics to do things on a battlefield undreamed of even a few decades ago.  This does include robotic weapons systems.  The important ingredient in all this tech is the presence of human control.  At this point in time it still takes a human to drive these war machines.

But we are not the far from being able to create ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Potential Hurricane Harvey Phishing Scams

08/28/2017 02:40 PM EDT  Original release date: August 28, 2017

US-CERT warns users to remain vigilant for malicious cyber activity seeking to capitalize on interest in Hurricane Harvey. Users are advised to exercise caution in handling any email with subject line, attachments, or hyperlinks related to Hurricane Harvey, even if it appears to ...

Continue Reading →
0

Investigating Email Headers

When I am investigating an email exploit, I will take a look at the email headers.  Email headers in an email are a lot like the html code in a web site.  This is information that the machines that create, send, and receive the email use for routing, and for providing other information about the message.  As a human, we do not see the headers unless we specifically look for ...

Continue Reading →
0

NIST Warns Against Lack of Security in Critical Infrastructure

NIST (National Institute for Standards and Technology) released Special Publication 800-53 version 4 recently, and it covers the shortcomings in privacy and security in the national power grid, water control systems, dams, oil and gas utilities and similar computer controlled systems.  There are no coherent or enforceable standards for Industrial Control Systems (ICS) and Supervisory Control And Data Acquisition (SCADA) systems ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


 Robots Can Crack Safes

Robots can crack safes faster than humans — and differently. We’re going to have to start thinking about robot adversaries as we design our security systems.  From Wired via Schneier.

https://www.wired.com/story/watch-robot-crack-safe/


[WordPress Security] Ransomware Targeting WordPress – An Emerging Threat

Over the past month, the Wordfence team has been tracking a ...

Continue Reading →
0

Twitter’s #Hashtag Turns 10

I remember it as the “number sign” or the “pound sign.”  Jeopardy contestants might know it is called an “octothorpe.”  The symbol itself goes back to Roman times, and was used extensively in the telephone industry, appearing on touch tone phone keypads as a way to allow special dialing features.

First suggested by Twitter marketing guru Chris Messina as a way to group, organize, and follow an idea in the Twitter stream, it quickly became a social media staple used not ...

Continue Reading →
0

SANS: Phishing Exploits Are The Top Threat

The SANS institute released the results of  a new survey recently, and found that cybersecurity professionals ranked phishing as the number one exploit this year.  Phishing awareness training programs were seen by many as the best defense against phishing, spearphishing and whaling exploits.  Something that was new this year was the reporting of so-called “malware-less” exploits that use “the built-in features of the operating system to turn it against itself without ...

Continue Reading →
0
Page 169 of 278 «...140150160167168169170171...»