Tag Archives: Cybersecurity

Your Wi-Fi Router Might Flood Your House


By Leonid Bershidsky – The Internet of Things is a bigger danger than most people realize: Pretty much all home Wi-Fi routers can easily be hacked, which is a problem if you’re an early adopter of connected light bulbs and faucets.

The routers are often made with cheap components, programmed sloppily just so that everything works, and released into the stores. There is no incentive for the manufacturers to update the firmware, which is often years older than the hardware on which it runs.

Since manufacturers don’t track the devices, the only way to install patches when they are released is to do it manually.

When was the last time you did this, or even checked the availability of new router firmware? more> http://tinyurl.com/k947lqj

97 Percent of Key Industries Doubt Security Compliance Can Defy Hackers

(GlebStock/Shutterstock.com )By Aliya Sternstein – Only 3 percent of information technology executives at utilities and other businesses critical to society strongly believe security rules and standards decrease threats to the systems running their operations.

“The regulations themselves are not getting the job done. It’s hard to have regulations in this area that are dynamic enough to be helpful,” Larry Ponemon told Nextgov. more> http://tinyurl.com/orhgyz3

They Want Your Enterprise Brains: Night of the Botnet of Things

How a botnet works: 1. A botnet operator sends...

How a botnet works: 1. A botnet operator sends out viruses or worms, infecting ordinary users’ computers, whose payload is a malicious application — the bot. 2. The bot on the infected PC logs into a particular command and control (C&C) server (often an IRC server, but, in some cases a web server). 3. A spammer purchases access to the botnet from the operator. 4. The spammer sends instructions via the IRC server to the infected PCs, causing them to send out spam messages to mail servers. (Photo credit: Wikipedia)

By Joe Stanganelli – Recent headlines have been rife with examples of security backdoors allowing hackers to take control of all manner of smart devices, including televisions, baby monitors, pacemakers, and cars.

IoT vulnerabilities transcend the consumer market, however, and the enterprise should be concerned. Industrial control systems increasingly deploy IoT technology. Many companies are already operating from energy-efficient smart buildings managed by city-wide smart grids and furbished with smart thermostats, smart lighting systems, smart emergency alarms, and smart whatever-else-you-can-think-of. more> http://tinyurl.com/oop9wzw


The complete guide to not being that idiot who got the company hacked

By Siraj Datoo – Every week there are headlines about a company getting its email, website, Twitter accounts or something else hacked. The reason? In a word: Employees. Each of your accounts and devices is a potential way in for a hacker.

How you do avoid being that weakest link?

  • Install “HTTPS Everywhere” on your browser
  • Put a password on your home Wi-Fi
  • Put passwords on all your devices
  • Employ two-step authentication on everything

more> http://tinyurl.com/pqhsg2z


A bad idea

By George Mattathil – Connecting everything to the Internet is a bad idea because

  1. Not everything need to be connected together,
  2. Connecting more things increases the security risks with hacking, spread of viruses and other network vulnerability, and
  3. There are better ways for providing connectivity, depending on requirements.

more> http://t.co/iWNsJZHZxK

Updates from BOEING

Always on Guard: Protecting Cyberspace

BOEING – At the highest level, we have always been in the business of connecting and protecting people, places and information. Our cyber business is an extension of that mission and our experience developing, deploying and defending complex systems for our customers and protecting our own global network drives our unique understanding of the challenge. We are working alongside our customers and investing to deliver enhanced security solutions to protect applications, infrastructure and mobile environments. more> VIDEO 2:42

The global economy and critical national infrastructures are largely dependent on computer networks. Boeing‘s NarusInsight provides a highly scalable, real-time monitoring, detection and mitigation “traffic intelligence” solution for service providers and government organizations. NarusInsight serves as a critical element in layered defense-in-depth approach by augmenting the enforcement of security policies. It enables unified operations for network and security and protects against unwanted, unwarranted or malicious traffic. NarusInsight provides a highly configurable solution to address networking and security needs today and tomorrow. more> http://tinyurl.com/jwbtfbf

How do you define a cybersecurity “professional’?

By Michael Cooney – How or should the cybersecurity workforce be formally professionalized?  The National Research Council this week issued a report that looks at the issues around how to professionalize a field it describes as so broad and diverse it could be hard to even treat it as a single occupation or profession.

Education certificates or formal certification can be helpful to employers who otherwise may find it difficult to evaluate the skills and knowledge of job applicants. But it takes time to develop common curricula and reach consensus on what core knowledge and skills should be assessed. Once a certification is issued, those standards run the risk of becoming obsolete, and workers may not have incentives to update their skills. In addition, some of the most talented individuals in cybersecurity are self-taught, and the requirement of formal education or training may deter potential employees from entering the field. more> http://tinyurl.com/mv7vst4