By Leonid Bershidsky – The Internet of Things is a bigger danger than most people realize: Pretty much all home Wi-Fi routers can easily be hacked, which is a problem if you’re an early adopter of connected light bulbs and faucets.
The routers are often made with cheap components, programmed sloppily just so that everything works, and released into the stores. There is no incentive for the manufacturers to update the firmware, which is often years older than the hardware on which it runs.
Since manufacturers don’t track the devices, the only way to install patches when they are released is to do it manually.
By Aliya Sternstein – Only 3 percent of information technology executives at utilities and other businesses critical to society strongly believe security rules and standards decrease threats to the systems running their operations.
“The regulations themselves are not getting the job done. It’s hard to have regulations in this area that are dynamic enough to be helpful,” Larry Ponemon told Nextgov. more> http://tinyurl.com/orhgyz3
How a botnet works: 1. A botnet operator sends out viruses or worms, infecting ordinary users’ computers, whose payload is a malicious application — the bot. 2. The bot on the infected PC logs into a particular command and control (C&C) server (often an IRC server, but, in some cases a web server). 3. A spammer purchases access to the botnet from the operator. 4. The spammer sends instructions via the IRC server to the infected PCs, causing them to send out spam messages to mail servers. (Photo credit: Wikipedia)
By Siraj Datoo – Every week there are headlines about a company getting its email, website, Twitter accounts or something else hacked. The reason? In a word: Employees. Each of your accounts and devices is a potential way in for a hacker.
BOEING – At the highest level, we have always been in the business of connecting and protecting people, places and information. Our cyber business is an extension of that mission and our experience developing, deploying and defending complex systems for our customers and protecting our own global network drives our unique understanding of the challenge. We are working alongside our customers and investing to deliver enhanced security solutions to protect applications, infrastructure and mobile environments. more> VIDEO 2:42
The global economy and critical national infrastructures are largely dependent on computer networks. Boeing‘s NarusInsight provides a highly scalable, real-time monitoring, detection and mitigation “traffic intelligence” solution for service providers and government organizations. NarusInsight serves as a critical element in layered defense-in-depth approach by augmenting the enforcement of security policies. It enables unified operations for network and security and protects against unwanted, unwarranted or malicious traffic. NarusInsight provides a highly configurable solution to address networking and security needs today and tomorrow. more> http://tinyurl.com/jwbtfbf
Education certificates or formal certification can be helpful to employers who otherwise may find it difficult to evaluate the skills and knowledge of job applicants. But it takes time to develop common curricula and reach consensus on what core knowledge and skills should be assessed. Once a certification is issued, those standards run the risk of becoming obsolete, and workers may not have incentives to update their skills. In addition, some of the most talented individuals in cybersecurity are self-taught, and the requirement of formal education or training may deter potential employees from entering the field. more> http://tinyurl.com/mv7vst4