Search Results for "home"

NotPetya Horror Story Highlights Need for Holistic Security

The NotPetya malware’s ability to cripple even sophisticated, global firms is a cautionary tale about the need for businesses to understand their risk and take a holistic view of security says Fadi Albatal, Chief Strategy Officer at Hitachi Systems Security.*

Podcast Episode 111: Click Here to Kill Everybody and CyberSN on Why Security Talent Walks

In this week’s podcast (episode #111), sponsored by CyberSN: what happens when the Internet gets physical? Noted author and IBM security guru Bruce Schneier joins us to talk about his new book on Internet of Things risk: Click Here to Kill Everybody. Also: everyone knows that cyber security talent is hard to come by, and even harder to keep. But why does precious cyber talent walk? In our second segment, we’re joined by Deidre Diamond of cyber security placement firm CyberSN, who has all the answers.

Voting Machine Maker Defends Refusal of White-Hat Hacker Testing at DEF-CON

Voting machine maker Election Systems & Software (ES&S) defended its decision not to participate in a white-hat hacking event at this year’s DEF-CON to test the security of voting systems, saying such hack-a-thons could actually jeopardize election security and invite hackers to disrupt electronic voting systems.

Podcast Episode 110: Why Patching Struts isn’t Enough and Hacking Electricity Demand with IoT?

In this week’s episode (#110): the second major flaw in Apache Struts 2 in as many years and has put the information security community on alert. But is this vulnerability as serious as the last, which resulted in the hack of the firm Equifax? We talk with an expert from the firm Synopsys.  And: we’ve heard a lot about the risk of cyber attacks on the critical infrastructure used to generate and distribute electricity. But what would happen if someone figured out to how to hack electricity demand? The Internet of Things just might make that possible. We talk to a Princeton University researcher behind a paper that discusses how even small changes in demand can have big consequences for the grid.

McAfee Researchers Exploit Smart Plug to attack Smart TV!

Researchers from McAfee have demonstrated how a flaw in a Belkin smart switch can be used to access other connected devices on the same network as the switch.