800x100 Webinar (1)
WP_Term Object
(
    [term_id] => 97
    [name] => Security
    [slug] => security
    [term_group] => 0
    [term_taxonomy_id] => 97
    [taxonomy] => category
    [description] => 
    [parent] => 0
    [count] => 300
    [filter] => raw
    [cat_ID] => 97
    [category_count] => 300
    [category_description] => 
    [cat_name] => Security
    [category_nicename] => security
    [category_parent] => 0
    [is_post] => 
)

The challenge of insecure IoT

The challenge of insecure IoT
by Bernard Murphy on 11-01-2016 at 7:00 am

An attack on Dyn (a DNS service provider) through a distributed denial of service (DDOS) attack brought down Github, Amazon and Twitter for a while and is thought to have been launched through IoT devices. Hangzhou Xiongmai, a provider of webcams and the most publicly pilloried source of weakness in the attack is now recalling all… Read More


The IoTrojan Horse – an army of toasters

The IoTrojan Horse – an army of toasters
by Bill Montgomery on 10-30-2016 at 4:00 pm

Most everybody is familiar with the term Trojan Horse, drawn from Greek mythology. It’s a tale from the Trojan War where, after a fruitless 10-year attempt to capture the city of Troy, the Greeks constructed a huge wooden horse, left it outside the city walls, and then sailed away, seemingly accepting defeat. The Trojans were elated,Read More


Top 5 Things to Know About Recent IoT Attacks

Top 5 Things to Know About Recent IoT Attacks
by Matthew Rosenquist on 10-30-2016 at 12:00 pm

Recent internet attacks resulted in popular sites becoming unreachable, such as Twitter, Etsy, Spotify, AirBnB, Github, and the New York Times. These incidents have brought to light a new threat to online services: Internet of Things (IoT) botnets. Distributed Denial of Service (DDoS) attacks have been commonplace for over… Read More


End-to-End Secure IoT Solutions from ARM

End-to-End Secure IoT Solutions from ARM
by Bernard Murphy on 10-25-2016 at 11:30 am

ARM announced today a comprehensive suite of solutions for IoT support, from IP optimized for applications in this space all the way to cloud-based support to manage edge devices in the field. Their motivation is to provide a faster path to secure IoT, from the chip to the cloud. One especially interesting component of this solution… Read More


Should Cybercrime Victims be Allowed to Hack-Back?

Should Cybercrime Victims be Allowed to Hack-Back?
by Matthew Rosenquist on 10-19-2016 at 12:00 pm

Being hacked is a frustrating experience for individuals and businesses, but allowing victims to hack-back against their attackers is definitely a dangerous and ill-advised path.

Compounding the issues is the apparent inability of law enforcement and governments to do anything about it. Cybercrime is expected to reach a dizzying… Read More


Phish Finding

Phish Finding
by Bernard Murphy on 10-18-2016 at 7:00 am

I wrote recently on the biggest hole in security – us. While sophisticated hacks on hardware and software make for good technology reading, fooling users into opening the front door remains one of the easiest and lowest cost ways for evil-doers to break into our systems. And one of the more popular ways to fool us is phishing in all … Read More


Artificial Intelligence for Cyber Security

Artificial Intelligence for Cyber Security
by Alex G. Lee on 10-17-2016 at 12:00 pm

Since the United States is such a large market for products and services from nearly all technology innovations, a patent counting for growth in patenting over a period of times in the US can be a good measuring tool for monitoring the evolution of technology innovations. Following figure shows the growth trends for the artificial… Read More


What Will Kill ROP Cyberattacks?

What Will Kill ROP Cyberattacks?
by Matthew Rosenquist on 09-28-2016 at 10:00 am

IBM recently announced a software-oriented solution to help eradicate Return Oriented Programming (ROP) malware attacks. ROP is a significant and growing problem in the industry. Crafty hackers will use snippets of code from other trusted programs and stitch it together to create their attacks. It has become a very popular… Read More


The Privacy Delusion

The Privacy Delusion
by Roger C. Lanctot on 09-28-2016 at 7:00 am

Why do we think we have privacy in our cars? Why does the government believe there is an interest in preserving privacy in cars? Can we just get over it? One of the least private places known to mankind – outside of the Internet – is the car!

But our transportation regulators in the U.S. and their counterparts at the European Commission… Read More