Light The Candles Of Cybersecurity
As we approach our national birthday, now 242 years in the making, let’s look at the trends and expectations settling out there on the horizon. Threats are up, breaches are increasing in size and scope, ransomware is hitting public and private organizations, and researchers struggle to keep pace with the clever people with bad intentions. […]
All That Glitters Is Not Gold Lowell
The City of Atlanta was recently the victim of a ransomware attack. As reported by Wired and others, Atlanta paid over $2.7 million dollars in consulting and legal fees to settle a $52,000 ransom. The malware used was of the SamSam strain, and experts at SecureWorks, the response firm working with the City,
A Bite Of The Apple
One of Apple’s many selling points, beyond the cool factor and lifestyle connectivity, is the relative security of Apple products, partly because of architecture and partly because their market share of end users remains relatively low. More people, it seems, prefer other hardware and operating systems. The only outlier may be the iPhone, so let’s […]
Do You Have Gas?
Let’s be honest. There are worse predicaments than having gas. One of them, perhaps, is not having gas. Another is surrendering to some bad actor the capacity to determine whether or not you have gas. The boys at the fourth grade lunch table would snicker and call it strategic flatulence, but we’re not in the […]
The Subtle Irony Of Cybersecurity
You are the master of the manor, the king of the castle, and you will deploy the greatest weapons in your vast arsenal to protect your business, your people, and your customers. Back in the day, your would wrap your soldiers in chain mail and the heaviest of protective layers, and you would call it […]
Is It That Time Again Already?
Graduations, weddings, and beach trips. These mark the transition from spring to summer. And, if you live along the Gulf Coast, hurricanes. Before the June page is even visible on our calendars, meteorological disturbances lurk in the increasingly warm waters of the Gulf of Mexico.
Not As Fast As You Might Think
In a recent Security Week article, Justin Fier holds forth on a topic that is at once both incredible and credible. The topic is data exfiltration, and the perspective the article casts makes it a worthy read. Most consumers and laypeople in the commercial streams of the Internet think data breaches occur with great haste,
Proven Exploits, Variable Payloads
Markets influence the choices hackers make in designing exploits and payloads. Ransomware is all the rage until cryptocurrencies rocket up the value chart. As those values recede, ransomware returns to the sexy side of the dark business. Newsweek makes the argument, in a recent story, that ransomware attacks draw more media attention. Maybe that’s because the […]
Fridge With A Mind Of Its Own
Well not exactly. Let’s just say the refrigerator may not always be focused on keeping your lettuce crisp. In a recent Express post, Harvey Gavin reports that hackers could seize control of your Samsung refrigerator and use it to mine bitcoin. And it’s not just the fridge.
The Real Deal
In a recent television interview, FBI Director Chris Wray reflected on Russian hacking into the American power grid and other vital infrastructure. The breach occurred in early March, and Wray didn’t mince words, calling the invasion “the real deal.” First the elections and now the grid? Wait.