Blog Stats
- 75,849 hits
Monthly Archives: July 2014
Bad Contractors
Even more of a reason to have a solid Third Party Assessment program within your organization. Not one, or two, but three Israeli defense contractors who built the Iron Dome missile defense system were compromised by hackers. How were they … Continue reading
Posted in Security Blog
Tagged 2014, Brian Krebs, CyberESI, Elisra Group, Iron Dome, Israel Aerospace Industries, krebs, Rafael Advanced Defense Systems, Third Party Assessments
Comments Off on Bad Contractors
80s Hacking
Too funny how Hollywood portrayed hacking in the 80s.
The Anti-Car-Hacking Gadget?
In December of 2013, US Senator Edward Markey sent a letter to car manufacturers in regards to securing vehicles against cyber-attacks. There is a $30 hacking kit that can be used to steal BMW cars and there is a $20 … Continue reading
Posted in Security Blog
Tagged 2014, car defense, car hacking, Charlie Miller, Chris Valasek, hacking
Comments Off on The Anti-Car-Hacking Gadget?
This is Horribly Out of Tune
and awesome! Vijay Haripal created this horribly wonderful video. Very creative, right? No lie, I liked it.
My Google GPS Footprint
I was in Hawaii on vacation from the 4th of July to the 17th. If you have an Android phone with GPS on, you can access your location history. Now of course, like most technology, this can be really cool, … Continue reading
Posted in Security Blog
Tagged 2-step, 2014, android, footprint, Google location history, gps, Information Technology Security Awareness, passwords, Security Awareness, two-factor
Comments Off on My Google GPS Footprint
Hawaii 2014
We just got back from a 13 day vacation in Hawaii. We were in O’ahu and had a fairly busy schedule, but with so much time spent, we also had a couple of days where we didn’t do anything. That … Continue reading
Posted in life
Comments Off on Hawaii 2014
What is CyberRisk?
The definition of cyber risk is an exposure to the chance of injury or loss by means of computerized attack. Here is a great article about the six trends of Cyber Risk for 2014.
Posted in Security Blog
Tagged 2014, cyber risk, cyberrisk, definition
Comments Off on What is CyberRisk?
Lights, Camera, Hacktion
A vulnerability was found by some white-hat hackers who researched how to obtain the wifi passwords of homes that had super cool lights that could be turned on, off, or dimmed by an app on a phone (both IOS and … Continue reading
Posted in Security Blog
Tagged 2014, camera, hacked, Information Technology Security Awareness, Internet of Things, lights, passwords, Security Awareness, wifi
Comments Off on Lights, Camera, Hacktion
The Study of a Thousand Breaches
According to this study, “Despite everything you’re read about cyber security, despite all the breaches in the news, the fact is well-intentioned business people are still surprisingly behind the times.” Hackers aren’t the only ones to blame when a breach … Continue reading
Posted in Security Blog
Tagged 2014, basel categories, events, likelihood, threats
Comments Off on The Study of a Thousand Breaches
Tedx CMU: Lorrie Faith Cranor: What’s wrong with your pa$$w0rd?
Lorrie Faith Cranor studied thousands of real passwords to figure out the surprising, very common mistakes that users — and secured sites — make to compromise security. And how, you may ask, did she study thousands of real passwords without … Continue reading
Posted in Security Blog
Tagged 2014, Lorrie Faith Cranor, passwords, ted, ted talks, Tedx CMU
Comments Off on Tedx CMU: Lorrie Faith Cranor: What’s wrong with your pa$$w0rd?