You are currently viewing SemiWiki as a guest which gives you limited access to the site. To view blog comments and experience other SemiWiki features you must be a registered member. Registration is fast, simple, and absolutely free so please, join our community today!
The May 2018 Federal Information Technology Acquisition Reform Act (FITARA) scorecard reported dismal cybersecurity preparedness for U.S. federal agencies. FITARA now includes a metric for grading agency cybersecurity postures, tied to the Federal Information Security Management Act (FISMA)...
Although not a complete picture, as data can be hard to come by and validate, researchers over at Bromium have estimated cybercrime to reach an unbelievable cost of about $1.5 trillion dollars. Take the numbers with a grain of salt, but the breakdown does give some understanding of the growing...
Governments are the biggest investors in developing offensive cyber capabilities and collecting technical exploits. Such digital arsenals are an asset but also a potential liability. Security and protection is crucial to these highly transferable and reusable resources. Strategic planning and...
Facial recognition has been struggling for some time to be accepted as a mainstream biometric. Apple’s latest generation iPhoneis shifting away from fingerprint scanning and may introduce large numbers of consumers to facial recognition to unlock their most personal device. But history has shown...
Cybersecurity is complex and there are many dangerous misconceptions that makes our digital lives even harder to achieve. Labeling specific technology as either Good or Bad can influence people to ignore potential risks and benefits. In reality technology can be used for in benign or malicious...
Software updates are becoming more painful. 465k pacemaker patients have been told they need a security patch.
The U.S. Food and Drug Administration (FDA) has issued a safety communication indicating a firmware update was necessary to address cybersecurity vulnerabilities in Abbott’s...
Where there is Crisis, there is Always Fraud
Hurricane Harvey, a massive Category 4, has devastated coastal regions of Texas, the major city of Houston, and surrounding communities. Americans have a long history of helping those in need after disasters. Tens of millions and possibly hundreds of...
Given how insecure IP cameras are, it is absolutely no surprise that the CIA has a number of tools and techniques to disable them when conducting operations. Over the past year, we have seen how many surveillance cameras are using default passwords, sending credential in-the-clear (unencrypted)...
An open source robot, developed by the team at Sparkfun, can crack a safe in 15 minutes. With motors, gears, and custom logic, this device is designed to find the right combination to unlock a reinforced door. It is a Do-it-Yourself automatic safe cracker! Should we worry about the risks of...
Reports are coming out of the Black Sea that back in June, a number of ships were impacted by interference with their Global Positioning Systems(GPS) that they use for navigation. A number of ships reported false GPS locations while in the Black Sea, indicating their position to be almost 20...
The Internet of Things Cybersecurity Improvement Act of 2017 is proposed legislation intending to require basic best-practices for cybersecurity when the government is looking to purchase products. It imposes certain design requirements and capabilities to enhance overall security.
It includes...