Two years after a false EAS alert about an incoming ICBM sowed terror in Hawaii, and seven years after security researchers warned about insecure, Internet connected Emergency Alert System (EAS) hardware, scores of the devices across the U.S. remain un-patched and vulnerable to cyber attack, according to security experts.
Recent Posts
Opinion: The Perils and Promise of the Data Decade
We have entered the “Data Decade,” says RSA Security CTO Dr. Zulfikar Ramzan. What does that mean? Here are three “Data Decade” trends that will reshape how we talk about, approach, and manage data.
IT Asset Disposition (ITAD) is the Slow Motion Data Breach Nobody notices
Efforts to wall off sensitive corporate and government data from foreign adversaries have a gaping hole: IT asset disposition (ITAD), where vendors – many owned by Chinese firms – process discarded hardware and data with little oversight.
Episode 173: Iran’s Cyber Payback for Soleimani Killing may have a Long Fuse
As it weighs further response to the assassination of General Qasem Soleimani, Iran is almost certain to consider the use of cyber attacks. We talk with Levi Gundert at the firm Recorded Future about what cyber “payback” from Tehran might look like.
Eliminate the Password, Eliminate the Password Problem.
Weak, stolen or reused passwords are the root of 8 in 10 data breaches. Fixing the data breach problem means abandoning passwords for something more secure. But what does passwordless authentication even look like? Yaser Masoudnia, the Senior Director Product Management, Identity Access Management, at LogMeIn* takes us there.