Farewell to the SHA-1 Hash Algorithm
Rest in peace SHA-1. Like all security controls, they are valuable only for a certain time. SHA-1, a legacy hashing...
Shamoon Rebooted?
We have recently received notifications and samples from impacted organizations in the Middle East that have hallmarks of the Shamoon...
Worms Could Spread Like Zombies via Internet of Things
Security researchers recently created a proof-of-concept attack against Internet-connected lightbulbs, causing breached devices to infect their neighbors. The propagation...
Keep Your Computer Close: PoisonTap Can Unlock It Almost Instantly
It’s never a good idea to leave your computer unattended. Since it carries mounds of valuable data, an unchaperoned computer...
The Holiday Season is Here, Spreading Hackable Gifts Wide and Near
It’s the most wonderful time of the year, but I’m feeling anxious — security anxious, that is. Every year, we...
More Capable IoT Botnets to Emerge as the ‘Pros’ Enter the Fray
On the heels of severe distributed denial of service (DDoS) attacks, we see new botnets emerging that are powered by...
Talking About Cyber Risks Educates the Community
In the last 12 months, we have seen an unprecedented number of cyberattacks occur or come to light. Sophisticated attacks against...
How a Single Password Triggered the Business Insider Breach
When it comes to cyberattacks, publicity is a magnet. But what happens when news publications themselves become targets? One of...
The Latest IoT Device I Do Not Want Hacked
What if someone hacked this remotely controlled semiautonomous tractor? I am a cybersecurity guy and a huge fan of technology....
How Valuable Is Your Health Care Data?
This blog was written by Bruce Snell. Health care is a hot topic in security right now. A quick search...