Tag: data privacy

Concept of IOT, internet of things.

Report: Organizations say IoT devices pose ‘catastrophic risk’, then shrug

The majority of corporations fear that a “catastrophic” security incident stemming from the Internet of Things (IoT) is an imminent risk. However, those same organizations still lack simple knowledge of how many IoT devices they have in their organization and how they are being used, let alone have oversight for how to protect them, according to new findings.

A new study finds that crypto currencies and in-game loot are helping cyber criminals launder cash.

Podcast Episode 88: Inside Russia’s DragonFly Group and How Cyber Crooks Launder Money

Podcast: Play in new window | DownloadSubscribe: Android | RSSIn this week’s Security Ledger Podcast (#88) we do a deep dive with researcher Vikram Thakur of the firm Symantec on “Dragonfly,” the Russian hacking group whose actions prompted the U.S. Department of Homeland Security and the FBI to issue a joint statement last week warning of intrusions into critical infrastructure in the US. Also: how do cyber criminals cash out all the loot they make from online scams? In our second segment we’ll talk to researcher Mike McGuire of the University of Surrey, who has been studying that question.

US diplomats stationed in Cuba reported feeling ill after sonic attacks launched from a mysterious source. But is that what really happened? New research suggests maybe not. (Image courtesy of US embassy.)

Podcast Episode 86: Unraveling the Cuban Embassy’s Acoustic Mystery

Podcast: Play in new window | DownloadSubscribe: Android | RSSIn this week’s episode of The Security Ledger Podcast (#86) we speak with Dr. Kevin Fu of the University of Michigan about research he conducted that casts doubts on reports of mysterious acoustic attacks on US embassy employees in Havana, Cuba. Also: Chip Block of Evolver talks about the Securities and Exchange Commission’s expanded cyber security guidance. And finally: thousands of radiologic sensors were deployed in the U.S. following the attacks of September 11 2001. We’ll look at new efforts to secure those systems from cyber attack.