The Security Ledger site advises that security flaws need more attention from medical device makers than they’ve often been getting. “The security of medical devices figured prominently at last week’s Black Hat, B-Sides and DEF CON hacking conferences in Las Vegas (August 2018). In one of the more news-worthy demonstrations, researchers Billy Rios and Jonathan […]
Archives: 'Security Threats'
Security and privacy are coming increasingly into conflict, but security, no surprise, is winning. Witness the new body scanners that are being installed on the Los Angeles’ subway, the first such installation in the U.S In Homeland Security reports that “The machines scan for metallic and non-metallic objects on a person’s body, can detect suspicious […]
The U.S. Department of Homeland Security has placed a clever video, “Take the Challenge”, on its home page. It’s intended to test our powers of observation and awareness. What, you say, I’ll never been in a threatening situation? That’s the whole point, we can never assume never when it comes to security. Thanks DHS!
Bruce Schneier discusses airport security, in the wake of a report that the Transportation Security Administration is considering eliminating security at U.S. airports that fly only smaller planes – 60 seats or fewer. “Passengers connecting to larger planes would clear security at their destinations.” If this sounds like a cockamamie approach to airport security, Schneier […]
Security against drone attacks was tested in Venezuela on August 6. The two drones involved lost, and Venezuelan President Nicolas Maduro, the target of the attacks, won. This from Security InfoWatch. “The plot was foiled, in part, by equipment designed to jam radio signals…. “Six suspects were in custody in connection with the Saturday attack, […]
Whether we need to worry about cyber intrusions into U.S. security or not, the Department of Homeland Security is concerned enough that, on July 31, it hosted “the first-of-its-kind National Cybersecurity Summit in New York City, bringing together industry partners and top federal officials with the goal of laying out a vision for a collective […]
In computer security, people get confused over the term “Cloud”, such as in storing information safely in “the Cloud”. Adnan Raja discusses the subject of Cloud security in a post on the securitymetrics blog. The Cloud is a term for online storage of backup information, as provided by Google, Apple, Amazon, IBM or lesser known […]
Insiders in organizations can – indeed, have been – responsible for more security breaches than employers would like to acknowledge. This, an observation by Jai Vijayan on the DarkReading site, ought to be giving managers pause, and reason for sharpening their organizational safeguards. “The key to dealing with insider threats,” Vijayan writes, “is to keep […]
“On the scene” at cloak and dagger covert operations: Protection Circle provides “Stories from the Field” so you can get a sense of what’s involved in conducting covert operations. Why would you want to know? Because they’re not just “cool”. Covert operations require knowledgeable planning and execution. But “once the operation is running properly, there […]
For any of our readers who may be active in school governance, or simply have children in school, here’s a reaction from the Department of Homeland Security to the two school shootings this year, and the others before them. A new DHS guide is entitled, “Enhancing School Safety Using a Threat Assessment Model: An Operational […]