Cisco ‘Knowingly’ Sold Hackable Video Surveillance System to U.S. Government

The Hacker News

Cisco ‘Knowingly’ Sold Hackable Video Surveillance System to U.S. Government | #TpromoCom #Hacker #VideoSurveillance #Legal | Cisco Systems has agreed to pay $8.6 million to settle a lawsuit that accused the company of knowingly selling video surveillance system containing severe security vulnerabilities to the U.S. federal and state government agencies.

image of nypd CI officer at row of monitors

The lawsuit began eight years ago, in the year 2011, when Cisco subcontractor turned whistleblower, James Glenn, accused Cisco of continue selling a video surveillance technology to federal agencies even after knowing that the software was vulnerable to multiple security flaws.

According to the court documents seen by The Hacker News, Glenn and one of his colleagues discovered multiple vulnerabilities in Cisco Video Surveillance Manager (VSM) suite in September 2008 and tried to report them to the company in October 2008. (click here)

Allan B. Colombo, Tech Writer
Allan B. Colombo, Tech Writer
Editor’s Note: For many years, I sought to warn security dealers of the risks of using specific brands recently named by the U.S. Government as being off limits to all federal applications. At the time, as the administrator with the CCTV Security Technicians Forum on Facebook, many members suggested that this only pertains to government use, which is correct, so they were going to continue selling those specific brands. My message to all dealers now as it was then, is that in the end analysis, if a CCTV system you sold and installed is hacked, and you knowingly sold it to the client, you could possibly be susceptible to legal action on the part of the client. –Al Colombo

Human Investigation Management – ISIO
Human Investigation Management – ISIO. Find out more by clicking!
Please follow and like us:
error

U.S. Launched Cyber Attacks on Iran After Drone Shootdown

SecurityWeek news and information

U.S. Launched Cyber Attacks on Iran After Drone Shootdown | #TpromoCom #Cyber #Hacker #Drone | U.S. military cyber forces launched a strike against Iranian military computers that crippled computers used to control rocket and missile launches, U.S. officials said Saturday.

US President Donald Trump is said to have secretly authorized US Cyber Command to carry out a retaliatory cyber attack on Iran in response to Iran’s downing of a U.S. surveillance drone.

The action by U.S. Cyber Command was a demonstration of the U.S.’s increasingly mature cyber military capabilities and its more aggressive cyber strategy under the Trump administration.

Read the Full Security Story: click here.

NTC, the most recognized name in training for the fire protection and low-voltage industry.
Please follow and like us:
error

5 Keys to Improve Your Cybersecurity

Hacker News

5 Keys to Improve Your Cybersecurity | #TpromoCom #CyberSecurity #Internet #Security | Cybersecurity isn’t easy. If there was a product or service you could buy that would just magically solve all of your cybersecurity problems, everyone would buy that thing, and we could all rest easy.

However, that is not the way it works. Technology continues to evolve. Cyber attackers adapt and develop new malicious tools and techniques, and cybersecurity vendors design creative new ways to detect and block those threats. Rinse and repeat.

Cybersecurity isn’t easy, and there is no magic solution, but there are a handful of things you can do that will greatly reduce your exposure to risk and significantly improve your security posture.

Want to know more?

To read the remainder of this informative article, click here.

This is an extremely difficult issue of Guns magazine to come by. The magazine features the .44 Magnum, which is the revolver that Clint Eastwood used in the movie, Dirty Harry.
Please follow and like us:
error

FBI Warns of Dangers in ‘Safe’ Websites

Dark Reading cybersecurity news website

FBI Warns of Dangers in ‘Safe’ Websites | #TpromoCom #FBI #CyberSecurity #Cyber | Criminals are using TLS certificates to convince users that fraudulent sites are worthy of their trust.

One of the most common mechanisms used to secure web browser sessions — and to assure consumers that their transactions are secure — is also being used by criminals looking to gain victims’ trust in phishing campaigns. The FBI has issued a public service announcement defining the problem and urging individuals to go beyond simply trusting any “https” URL.

Browser publishers and website owners have waged successful campaigns to convince consumers to look for lock icons and the “https:” prefix as indicators that a website is encrypted and, therefore, secure. The problem, according to the FBI and security experts, is that many individuals incorrectly assume that an encrypted site is secure from every sort of security issue.

To read the remainder of this news article, click here.

Please follow and like us:
error

The Hotel Hijackers White Paper

The Hotel Hijackers White Paper | #TpromoCom #Hotel #Hacker #CyberSecurity | From booking a room to the payments made at shops and restaurants, hotel chains have complex networks that save enormous amounts of sensitive and private data, just waiting to be compromised.

This makes the hospitality industry one of the main targets for cybercriminal activity.

Download our whitepaper, The Hotel Hijackers, to understand:

  • Why hotel networks became a target of cybercriminals,
  • A history of attacks on the industry
  • How these types of attacks can be avoided

Download Now

TpromoCom [image]
Need help with a new website, blog, or social media outreach program? Call TpromoCom at 330-956-9003 for help.
Please follow and like us:
error

Nine Charged in SIM Hijacking Scheme

SecurityWeek news and information

Nine Charged in SIM #Hijacking Scheme | #TpromoCom #DOJ #Hacker #Hackers | The United States has indicted nine individuals with online identity theft and related charges, the U.S. Department of Justice announced.

Six of the individuals were charged with wire fraud in connection to the hacking group “The Community,” while three former employees of mobile phone providers were charged with wire fraud in relation to the conspiracy.

Charges were brought against Conor Freeman, 20, of Dublin, Ireland; Ricky Handschumacher, 25 of Pasco County, Florida; Colton Jurisic, 20 of, Dubuque, Iowa; Reyad Gafar Abbas, 19, of Rochester, New York; Garrett Endicott, 21, of Warrensburg, Missouri; Ryan Stevenson, 26, of West Haven, Connecticut; Jarratt White, 22 of Tucson, Arizona; Robert Jack, 22 of Tucson, Arizona; and Fendley Joseph, 28, of Murrietta, California.

The defendants are alleged members of “The Community,” a hacking group focused on stealing victims’ identities to perform cryptocurrency theft via “SIM Hijacking.”

To read the remainder of this news article, click here.

Human Investigation Management – ISIO
Human Investigation Management – ISIO
Please follow and like us:
error

Hackers Still Outpace Breach Detection, Containment Efforts

Dark Reading cybersecurity news website

#Hackers Still Outpace #DataBreach Detection, Containment Efforts | #TpromoCom #Hacker #CyberSecurity | Research shows time to discovery and containment of breaches slowly shrinking, but attackers don’t need a very big window to do a lot of damage.

It’s breach report season and one of the prevailing trends uncovered by security researchers is that organizations are ever-so-slowly improving the window between when a compromise occurs and when it gets detected. In spite of this slight gain, the fact solidly remains that the typical breach timeline still completely favors attackers.

Two different reports this spring showed that organizations are shortening the time to discovery of data breaches. Most recently, the Trustwave 2019 Global Security Report released late last month found that the time between an intrusion and detection of that incident shrank almost in half. That study showed that the median time between intrusion and detection fell from 26 days in 2017 to 14 days in 2018.

To read the remainder of this news article, click here.

Please follow and like us:
error

DoS Attack Blamed for U.S. Grid Disruptions

SecurityWeek news and information

#DoS Attack Blamed for U.S. #Grid Disruptions | #TpromoCom #Power #CyberSecurity #Hackers | According to the National Energy Technology Laboratory’s OE-417 Electric Emergency and Disturbance Report for the first quarter of 2019, a cyber event caused “interruptions of electrical system operations.”

The report shows that the incident impacted an unidentified utility in the region overseen by the Western Electricity Coordinating Council (WECC), which is responsible for compliance monitoring and enforcement in the Western Interconnection, and affected California (Kern County and Los Angeles County), Utah (Salt Lake County) and Wyoming (Converse County).

However, the report shows that the incident did not result in any power outages. The cyber event occured on March 5 — it started at 9:12 AM and systems were restored by 6:57 PM on the same day.

To read the remainder of this news article, click here.

[image] TpromoCom provides affordable websites & blogs.
TpromoCom provides affordable websites & blogs. Call 330-956-9003, or click on banner.
Please follow and like us:
error