Pacemaker controllers still vulnerable 18 months after flaws reported

Pacemaker controllers still vulnerable 18 months after flaws reported | #TpromoCom #Pacemaker #Medical #CyberSecurity #Health | A popular brand of heart pacemaker is still vulnerable to compromise more than a year and a half after the company that makes them was told of weaknesses in its security, researchers have claimed during a Black Hat presentation.

To read this interesting and timely news article, click  here.

Please follow and like us:

Ban of Dahua and Hikvision is Now US Gov Law

Ban of Dahua and Hikvision is Now US Gov Law | #TpromoCom #Government #Congress #Camera |  The US President has signed the 2019 NDAA into law, banning the use of Dahua and Hikvision (and their OEMs) for the US government, for US government-funded contracts and possibly for ‘critical infrastructure’ and ‘national security’ usage.

To read the remainder of this news article, click here. (scroll down for more)

Al’s View: There are those who claim that this is purely political in nature, that all IP-based cameras have backdoors in the software, that Cisco, Axis, and more  have experienced the same kinds of bugs in the rug. They also claim that making adjustments at the network level will solve the problem. The only thing missing here is the fact that those who have bugs in the rugs as a natural consequence of creating a new software have these problems by accident and the Chinese-owned camera manufacturers named in the legal briefs have introduced them by intent. How will this impact the security industry? We’ll see. –Al Colombo

Please follow and like us:

Snapchat Hack — Hacker Leaked Snapchat Source Code On GitHub

Snapchat Hack — Hacker Leaked Snapchat Source Code On GitHub  | #TpromoCom #Hacker #Hackers #CyberSecurity #SnapChat |  A GitHub account under the name Khaled Alshehri with the handle i5xx, who claimed to be from Pakistan, created a GitHub repository called Source-Snapchat with a description “Source Code for SnapChat,” publishing the code of what purported to be Snapchat’s iOS app.

To read the remainder of this news article, click here.

 

Please follow and like us:

Vulnerable Smart City Devices Can Be Exploited To Cause Panic, Chaos

Vulnerable Smart City Devices Can Be Exploited To Cause Panic, Chaos | #TpromoCom #CyberSecurity #Hackers #Hacker #SmartCity | False alerts about floods, radiation levels are just some of the ways attackers can abuse weakly protected IoT devices, researchers warn.

To read the remainder of this news article, click here.

Dark Reading | Security | Protect The Business - Enable Access

Al’s Viewpoint: Hackers are quick to take advantage of any and all vulnerabilities where it comes to any and everything “Internet.” IoT is a godsend, and yet it’s a curse. I continue to get notices of impending doom, weather emergencies, etc. on my dumbphone and I ignore them all. Yes, at my own peril.  But I also listen to the radio (when I’m not on Internet Radio).  Life is too short to live it in fear. Know the limits of the tech as well as the vulnerabilities and risks and use it with all of this in mind. –Al Colombo

Please follow and like us:

Researcher Finds Hundreds of #Planes Exposed to Remote Attacks

Researcher Finds Hundreds of #Planes Exposed to Remote Attacks | #TpromoCom #hackers #hacker #CyberSecurity | After passively collecting traffic from the airplane’s Wi-Fi network, Santamarta noticed that several commonly used services, such as Telnet, HTTP and FTP, were available for certain IP addresses, and some interfaces associated with the plane’s on-board satellite communications (satcom) modems were accessible without authentication. http://ow.ly/uoah30loQHo

Hacking airplanes via satcom systems

Editor’s Note: I  have said this time after time, but the Internet is a huge two-edged sword that can, on the one hand, make you a ton of money and friends, and on the other, it can kill  you quicker than a plane crash.  In this case, it can do exactly that.  –Al Colombo

Please follow and like us:

“Internet of Things (IoT) Security in Smart Home Devices”

Internet of Things (IoT) Security in Smart Home Devices | #TpromoCom #IoT #Hacker #Hackers | 25 insights from testing 50 devices on the market in 2015. Download this report now: click here. (scroll down for more)

Internet of Things (IoT) Security in Smart Home Devices

The Internet of Things (IoT) refers to devices that can send or receive data automatically, without being prompted by human interaction. Examples are cars that notify drivers of low tire pressure, a security system notifying the home owner, or smart thermostats maintaining optimum home temperature based on outside weather.

These devices have very low security protocols. While attackers or hackers have not found a way to profit from taking control of devices yet, it is only a matter of time. The most common access points are through the cloud or the home Wi-Fi Ethernet network. Device owners can protect themselves by:

  • Ensuring strong security protocols and encryption on the home network
  • Changing default passwords
  • Disabling unneeded features or features not in use
  • Avoid secondhand (and therefore potentially compromised) devices
  • Install updates as they become available.

Offered Free by: InsightBrief

Please follow and like us:

How to mitigate IoT threats to video surveillance systems

How to mitigate IoT threats to video surveillance systems | #TpromoCom #IoT #Hacker #Hackers #CyberSecurity |  as device connectivity continues to define the digital age, monitoring the technology that monitors us is demanding stricter rules and protocols to ensure risk is mitigated, threats are dealt with in a proactive manner and global laws are managed.  (read more)

bigstock Internet Of Things Concept Bac 236246614 5b3f7fa276ea6

Please follow and like us: