Tag Archives: Cybersecurity

Your Wi-Fi Router Might Flood Your House


By Leonid Bershidsky – The Internet of Things is a bigger danger than most people realize: Pretty much all home Wi-Fi routers can easily be hacked, which is a problem if you’re an early adopter of connected light bulbs and faucets.

The routers are often made with cheap components, programmed sloppily just so that everything works, and released into the stores. There is no incentive for the manufacturers to update the firmware, which is often years older than the hardware on which it runs.

Since manufacturers don’t track the devices, the only way to install patches when they are released is to do it manually.

When was the last time you did this, or even checked the availability of new router firmware? more> http://tinyurl.com/k947lqj

97 Percent of Key Industries Doubt Security Compliance Can Defy Hackers

(GlebStock/Shutterstock.com )By Aliya Sternstein – Only 3 percent of information technology executives at utilities and other businesses critical to society strongly believe security rules and standards decrease threats to the systems running their operations.

“The regulations themselves are not getting the job done. It’s hard to have regulations in this area that are dynamic enough to be helpful,” Larry Ponemon told Nextgov. more> http://tinyurl.com/orhgyz3

They Want Your Enterprise Brains: Night of the Botnet of Things

How a botnet works: 1. A botnet operator sends...

How a botnet works: 1. A botnet operator sends out viruses or worms, infecting ordinary users’ computers, whose payload is a malicious application — the bot. 2. The bot on the infected PC logs into a particular command and control (C&C) server (often an IRC server, but, in some cases a web server). 3. A spammer purchases access to the botnet from the operator. 4. The spammer sends instructions via the IRC server to the infected PCs, causing them to send out spam messages to mail servers. (Photo credit: Wikipedia)

By Joe Stanganelli – Recent headlines have been rife with examples of security backdoors allowing hackers to take control of all manner of smart devices, including televisions, baby monitors, pacemakers, and cars.

IoT vulnerabilities transcend the consumer market, however, and the enterprise should be concerned. Industrial control systems increasingly deploy IoT technology. Many companies are already operating from energy-efficient smart buildings managed by city-wide smart grids and furbished with smart thermostats, smart lighting systems, smart emergency alarms, and smart whatever-else-you-can-think-of. more> http://tinyurl.com/oop9wzw


The complete guide to not being that idiot who got the company hacked

By Siraj Datoo – Every week there are headlines about a company getting its email, website, Twitter accounts or something else hacked. The reason? In a word: Employees. Each of your accounts and devices is a potential way in for a hacker.

How you do avoid being that weakest link?

  • Install “HTTPS Everywhere” on your browser
  • Put a password on your home Wi-Fi
  • Put passwords on all your devices
  • Employ two-step authentication on everything

more> http://tinyurl.com/pqhsg2z


A bad idea

By George Mattathil – Connecting everything to the Internet is a bad idea because

  1. Not everything need to be connected together,
  2. Connecting more things increases the security risks with hacking, spread of viruses and other network vulnerability, and
  3. There are better ways for providing connectivity, depending on requirements.

more> http://t.co/iWNsJZHZxK