БЛОГ

Archive for the ‘cybercrime/malcode’ category: Page 204

Mar 1, 2016

Utilities Cautioned About Potential for a Cyberattack After Ukraine’s

Posted by in categories: cybercrime/malcode, energy

Working remotely, attackers conducted “extensive reconnaissance” of the Ukraine power system’s networks, stole the credentials of operators and learned how to switch off the breakers, plunging more than 225,000 Ukrainians into darkness.

Read more

Feb 29, 2016

Kaspersky Labs rolls out targeted threat detection platform for enterprises

Posted by in category: cybercrime/malcode

“Kaspersky admits that targeted attacks represent less than one percent of the entire threat landscape”;

Hmmm (wonder how much it cost to develop and deploy?) At least it’s a start.

https://lnkd.in/bzjHfzF

Continue reading “Kaspersky Labs rolls out targeted threat detection platform for enterprises” »

Feb 29, 2016

What is the Dark Web?

Posted by in category: cybercrime/malcode

This has been around for a really, really long time. I remember many years ago one could go online without too much hassel and locate software code that the hacking network shared to teach folks their trade. I actually tested some of it for a firm to help test their infrastructure security; and it worked really well. However, now days it’s about the trade of id’s, credit card information, etc.


Beyond the regular Web, there is the Dark Web. You’ve probably heard something about it but probably just enough to know you didn’t want to know too much more about it. Well, here are some answers to some common questions about the Dark Web.

Read more

Feb 29, 2016

Google opens applications for free DDoS blocker to prevent hackers taking out the Web

Posted by in categories: cybercrime/malcode, internet

The DDoS prevention tool is part of Google Ideas, renamed Jigsaw, whose stated mission is to “build products to help people investigate corruption.”

Read more

Feb 29, 2016

Want to avoid breaches Think like a hacker

Posted by in category: cybercrime/malcode

One philosophy that I have often practice and encourage my team to do is to think like a hacker. It has served me and my teams well. At times; I have shared areas where risks exist in the emerging technologies; and hope that I don’t make folks too nervous. However, we all have to start thinking like hackers or pay the cost some day.


C-level executives from giant corporations and officials from the smallest companies all must think like hackers and test their cyber defenses regularly if they expect to avoid breaches of their systems.

That’s according to a panel of cybersecurity experts who recently spoke to a crowd gathered at the Donald Danforth Plant Science Center.

Continue reading “Want to avoid breaches Think like a hacker” »

Feb 29, 2016

IS hacks UK solar firm site in revenge

Posted by in categories: cybercrime/malcode, solar power

I always caution folks to never say “never” especially around hacking and worst case scenarios relating to security. Granted there is a balance around not going too overboard. However, when it comes to being risk adverse and determining how much risk your company can absorb must be a core piece of your assessment. And, an attack like the one by ISIS in this article can not be allowed.

https://lnkd.in/b-_mdNW


LONDON: ISIS terrorists hacked the website of a UK-based solar firm as revenge for the killing of one of their British Muslim members, a media report said on Sunday.

Continue reading “IS hacks UK solar firm site in revenge” »

Feb 29, 2016

Data breach lawsuits indicate a troubling trend for enterprises

Posted by in categories: cybercrime/malcode, robotics/AI

I see these growing exponentially in the next few years especially when companies introduce autonomous technologies. One must ponder how far will these go when the breach was inside a bank that is leveraging technology and/ or autonomous technologies from vendors. https://lnkd.in/bzXdix3


A number of data breach lawsuits have been filed against major enterprises in recent years, which could lead to mounting data breach costs.

Read more

Feb 28, 2016

Report Cites Dangers of Autonomous Weapons

Posted by in categories: cybercrime/malcode, military, policy, robotics/AI

I agree 100% with this report by former pentagon official on AI systems involving missiles.


A new report written by a former Pentagon official who helped establish United States policy on autonomous weapons argues that such weapons could be uncontrollable in real-world environments where they are subject to design failure as well as hacking, spoofing and manipulation by adversaries.

In recent years, low-cost sensors and new artificial intelligence technologies have made it increasingly practical to design weapons systems that make killing decisions without human intervention. The specter of so-called killer robots has touched off an international protest movement and a debate within the United Nations about limiting the development and deployment of such systems.

Continue reading “Report Cites Dangers of Autonomous Weapons” »

Feb 28, 2016

Walter O’Brien Tipped As The Next Elon Musk, Ranked As One Of Five Smartest People Alive

Posted by in categories: cybercrime/malcode, Elon Musk

What can be better than to go head to head against cyber attacks, let computer have a mind of their own and protect themselves? The executive producer of CBS hit show, Scorpion, and the CEO of Scorpion Computer Services, Walter O’Brien says that it not only is possible, but can be the only solution to stop such attacks.

@tferriss loved the Walter O’ Brien podcast. But, did you pick up on any issues with his story? https://t.co/jf8Gm2Ls1Y

Continue reading “Walter O’Brien Tipped As The Next Elon Musk, Ranked As One Of Five Smartest People Alive” »

Feb 28, 2016

Why I’m not worried about the LEAF hack or my garage break-in

Posted by in categories: cybercrime/malcode, habitats, transportation

The person in the article is not very smart. 1st you never offer a tempting challenge to a hacker in public forum. I have known too many and followed to many since the 80’s. 2nd, house burgulars are not even close to the calibur of hackers.


I own a 2013 Nissan LEAF SV with telematics functions known as CARWINGS. CARWINGS connected to my car via an app also called NissanConnect EV that was hacked by Troy Hunt and came into to the news this week. Nissan issued two different statements about the hack and eventually shut off the app completely.

LEAF owners are concerned that because the app was easy to-hack with the LEAF’s VIN number that access could be used for malicious use.

Continue reading “Why I’m not worried about the LEAF hack or my garage break-in” »