Tag Archives: Internet of Things

2016 San Francisco CISO Executive Summit

I had the privilege of attending the 2016 CISO Executive Summit in San Francisco on Monday the 5th. I went with a great group of people! There was a lot of good discussions regarding leadership, insider threats, third party management, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on 2016 San Francisco CISO Executive Summit

Dyn Down by DDoS

Dyn a company that provides dynamic domain name resolution (convert names into IP addresses) was threatened to shell out some bitcoin or else… Or else what? I’d like to call it an availability compromise, but in layman’s terms, an outage … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , , | Comments Off on Dyn Down by DDoS

Ransomware and the IoT

During a security conference, a gentleman demonstrated a thermostat that he compromised, lock out the user for a ransom. He was even able to make the thermostat emit a tone only animals can hear. Imagine your dogs or cats freaking … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Ransomware and the IoT

The Largest Distributed Denial of Service, EVER! (A Robot Knock-Knock Description)

Denial of Service explained: Computers respond to network traffic, generally. If there was a computer on my network that wanted to talk to my computer, that computer would put out a request to talk to my computer over the network, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on The Largest Distributed Denial of Service, EVER! (A Robot Knock-Knock Description)

Thanks Siri… “Smart Lock” Lets the Neighbor In

Someone decided to automate his house with Philips Hue LED lights bulbs you can turn on with your phone, Ecobee Wi-Fi thermostats and remote temperature sensors for the house. He also bought himself an August Smart Lock: a Bluetooth-enabled lock … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on Thanks Siri… “Smart Lock” Lets the Neighbor In

This Guy Asks Hackers to Ruin His Life!

An eye-opening video about the capability of hack attacks, from social engineering to complete digital-life and real life takeover. Not only is the journalist asking people to do it, experts blatantly show how they do it. Please take the time … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on This Guy Asks Hackers to Ruin His Life!

Police Body Cameras Infected with Conficker Worm

ConfickerĀ is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008. It uses flaws in Windows OS software and dictionary attacks on administrator passwords to propagate while forming a botnet, and has been unusually … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , | Comments Off on Police Body Cameras Infected with Conficker Worm

Your Evolving Digital Life

Click the graphic to learn more about NCSAM!

Posted in Security Blog | Tagged , , , , , | Comments Off on Your Evolving Digital Life

The Internet of Shit

There are so many things that are spawning with Internet of Things technology. Internet connected everything! Most devices spy on us… What happens when devices learn they can blackmail us? The Internet of Shit’s Twitter presence is one to follow.

Posted in Security Blog | Tagged , , , , | Comments Off on The Internet of Shit

A Car is a Computer with Wheels

Your car is totally hackable. See more posts on Car Hacking

Posted in Security Blog | Tagged , , , , , , | Comments Off on A Car is a Computer with Wheels