The Security Ledger site advises that security flaws need more attention from medical device makers than they’ve often been getting. “The security of medical devices figured prominently at last week’s Black Hat, B-Sides and DEF CON hacking conferences in Las Vegas (August 2018). In one of the more news-worthy demonstrations, researchers Billy Rios and Jonathan […]
Archives: 'Security Trends'
Security and privacy are coming increasingly into conflict, but security, no surprise, is winning. Witness the new body scanners that are being installed on the Los Angeles’ subway, the first such installation in the U.S In Homeland Security reports that “The machines scan for metallic and non-metallic objects on a person’s body, can detect suspicious […]
The U.S. Department of Homeland Security has placed a clever video, “Take the Challenge”, on its home page. It’s intended to test our powers of observation and awareness. What, you say, I’ll never been in a threatening situation? That’s the whole point, we can never assume never when it comes to security. Thanks DHS!
Bruce Schneier discusses airport security, in the wake of a report that the Transportation Security Administration is considering eliminating security at U.S. airports that fly only smaller planes – 60 seats or fewer. “Passengers connecting to larger planes would clear security at their destinations.” If this sounds like a cockamamie approach to airport security, Schneier […]
Security against drone attacks was tested in Venezuela on August 6. The two drones involved lost, and Venezuelan President Nicolas Maduro, the target of the attacks, won. This from Security InfoWatch. “The plot was foiled, in part, by equipment designed to jam radio signals…. “Six suspects were in custody in connection with the Saturday attack, […]
In computer security, people get confused over the term “Cloud”, such as in storing information safely in “the Cloud”. Adnan Raja discusses the subject of Cloud security in a post on the securitymetrics blog. The Cloud is a term for online storage of backup information, as provided by Google, Apple, Amazon, IBM or lesser known […]
Insiders in organizations can – indeed, have been – responsible for more security breaches than employers would like to acknowledge. This, an observation by Jai Vijayan on the DarkReading site, ought to be giving managers pause, and reason for sharpening their organizational safeguards. “The key to dealing with insider threats,” Vijayan writes, “is to keep […]
For a change of pace, Protection Circle offers some “stories from the field” on how covert security operations can be difficult, risky, expensive, or just funny, to manage. Such as, “…a production company client from Los Angeles that wanted a certain celebrity who was attending an event in San Francisco to receive covert protection. This, […]
For any of our readers who may be active in school governance, or simply have children in school, here’s a reaction from the Department of Homeland Security to the two school shootings this year, and the others before them. A new DHS guide is entitled, “Enhancing School Safety Using a Threat Assessment Model: An Operational […]
Following up on Briefs’ last post on cyber crime, here, from Wired magazine, are “The Worst Cybersecurity Breaches of 2018 So Far”. Wired’s warning: “Corporate security isn’t getting better fast enough, critical infrastructure security hangs in the balance, and state-backed hackers from around the world are getting bolder and more sophisticated.” The examples range from […]