Archives: 'IT Security'

Doug Bedell — February 21, 2018, 4:11 pm

Truckers Increasingly Aware of the Need for Cybersecurity

Here’s an indication of how the awareness of the need for heightened cyber security keeps rolling on: DarkReading reports that the American Trucking Associations (ATA) has launched “FleetCyWatch, a new service for members of the trucking industry to share threat information and report cybercrimes affecting fleet operations.” What would such a cybercrime be? From the […]

Doug Bedell — February 6, 2018, 5:18 pm

Small Business People: You’re Increasingly Under Cyber Attack

Small businesses across the U.S. are increasingly finding themselves the victims of cyber crimes, reports Security Info Watch. “Small businesses across the country,” says the Info Watch post, “are finding that they have suddenly emerged as potential targets of both nefarious solo hackers looking to steal personal information or engage in ransomware scenarios, as well […]

Doug Bedell — January 23, 2018, 3:08 pm

U.S. Marines Looking for More Than a Few Good Hackers

The U.S. Marine Corps., reports Defense Tech, is recruiting cyber operations specialists who will be assured of careers as Marine cyber security and hacking experts. “Join the Marines and serve at a keyboard,” might well be the slogan of corps’ recruiters. Security has come to rest on more than battlefield tactics. “‘Anybody in here a […]

Doug Bedell — January 19, 2018, 12:32 pm

Troops Will Have Wi-Fi On Any Future Battlefields

While not an explanation of how it’s achieved, Defense Tech discusses something you’ll be interested in knowing about – Secure Wi-Fi technology that’s now available in “the fast-moving world of battlefield communications”. “The 1st Armored Brigade Combat Team, 3rd Infantry Division,” Defense Tech reports, “successfully piloted the Wi-Fi capability during decisive action training at the […]

Doug Bedell — January 8, 2018, 3:33 pm

How to Defend Against the ‘Spectre’ and ‘Meltdown’ Attacks

The Spectre and Meltdown processor vulnerabilities discovered as the year turned have been getting a lot of priority attention to insure the security of computer systems. What are they? It’s a complex subject, but here, on the ThreatPost blog, is one of the best run-throughs on it that we’ve seen – for Windows, Mac and […]

Doug Bedell — January 2, 2018, 4:18 pm

Staying Out of CyberSecurity’s ‘Upside Down’

On DarkReading, Carol Clark describes the alternative reality of cybersecurity turned upside down, describing it as “an alternative reality where none of us wants to be.” That’s because a breach “stops business, costs millions, and can have an incalculable impact on current and future customers.” Whether a cybersecurity breach is this catastrophic or not, it’s […]

Doug Bedell — December 29, 2017, 3:15 pm

Steps for Responding to Cybersecurity Attacks in 2018

Wish we could be ending 2017 on a more upbeat note, but cyber security is a key challege of our times. And the Clearswift blog in the UK responds with a scenario for dealing with attacks that it considers all too likely in 2018. “Preparing for the inevitable will make the situation significantly less damaging […]

Doug Bedell — December 6, 2017, 4:00 pm

‘Phishers’ and ‘Spear Phishers’ Explained

Phishing and spear-phishing – the difference between these two forms of cyber security attacks is explained in a TechCrunch post. “Spear-phishing, like phishing, involves emailing a malicious link or file. Whereas phishers send mass emails in hopes of stealing credit card information, Social Security numbers and login credentials from as many people as possible,” Tom […]

Doug Bedell — November 29, 2017, 9:39 am

Cybersecurity Tests Looming for Internet Use in 2018

Get ready for cybersecurity challenges to your Internet presence in 2018. That’s the not so surprising warning/invitation from In Homeland Security as the new year approaches. “As the continuing digital transformation of our lives entails the ongoing digital transformation of crime, vandalism and warfare, 2018 could bring a lot of new takes on old vulnerabilities, […]

Doug Bedell — November 21, 2017, 10:59 am

Network Penetration Testing Well Worth Considering

George Mateaki on the Security Metrics blog explains penetration testing – Network Penetration Testing 101 – and why it’s advisable for businesses to confirm the security of their workaday environments.` “Penetration testing, in general,” Mateaki explains, “is a type of ‘ethical certified hacking’ during which a pen tester will attempt to enter and exploit your […]