twitter facebook rss

When Scanners Attack

Posted by Martin Zinaich on July 30, 2017

When scanners attack, it just makes you WannaCry. So we had WannaCry, DoublePulsar, Petya – the whole EternalBlue exploit release. EternalBlue exploits a vulnerability in Microsoft’s implementation of the Server Message Block (SMB) protocol. The vulnerability exists because the SMB version 1 (SMBv1) server in various versions of Microsoft Windows accepts specially crafted packets from […]

Injunction of Technology (IoT)

Posted by Martin Zinaich on April 16, 2017

Soon coming to the Internet of Things (IoT) is the Injunction of Technology (IoT). In another post I noted that my WiFi router’s power brick had a UL certification, yet the actual WiFi router had nothing similar stating it was safe to use on the Internet. In addition, nothing to ensure it would not hurt […]

Internet of Things? *All I want is a proper cup of coffee…

Posted by David Harley on March 3, 2016

David Harley photo

Does everything have to be attached to the Internet of Things?

Predictable Predictions and IoT

Posted by David Harley on January 22, 2016

David Harley photo

Should you worry about IoT security quite so much as the media suggest?

Icebergs and Security Predictions

Posted by David Harley on December 22, 2015

David Harley photo

It’s traditional at this time of year for security researchers to risk their credibility by offering their predictions as to what will happen in information security in the next 12 months. Usually in multiples of ten. Or at least the unhidden one-tenth of the researcher iceberg spending enough time in the public eye to attract the attention of […]

The Internet of Spying Things

Posted by Kevin on November 25, 2015

Time was when we made things, we sold things, we got paid for those things and we received enough to feed and clothe ourselves, provide housing and have enough money left over to buy the materials to make some more things to sell. Not any more. And yet you would think – given that the […]

Security is everyone’s responsibility!

Posted by Bev Robb on April 29, 2015

wipe and flush security

Four simple words This morning I accepted a new LinkedIn connection who works for Johns Hopkins University and SANs. Aside from all of his certifications, and over a decade of security experience — he is also recognized as a strong security advocate and change agent; is self-driven, self-motivated, and result-orientated. Though he obviously holds many credentials and […]

Time to get Real on IoT

Posted by Alexander Hanff on April 29, 2015

I was reading my Twitter feed this afternoon and a member of my network posted an article about how the Internet of Things (IoT) will create a virtual world with virtual people and how wonderful this will be for society, ushering in a future where we control everything without ever having to really do anything.  […]

ITsecurity Daily News: 09/19/2014

Posted by Kevin on September 19, 2014

The ITsecurity daily security briefing: Friday, September 19, 2014. If you find this security briefing useful, please spread the word via social media. If you have any comments or recommendations, please email kevtownsend at gmail dot com. News Papers/Reports WebThings Events M&A Alerts News Vupen has a competitor – Kevin Mitnick   Vupen is the […]