IoT – Hackable Thermostats

The “Internet of Things” (IoT to the cognoscenti) has been around for a while, but is gaining prominence now as almost every technology-based product that can be integrated with Internet access is in fact being integrated for Internet access.  The reasons for doing this are not always compelling…but ‘smart home’ tech has been around for decades (remember the X-10 home…

Details

Magnus Cloud Introduces the First Active Countermeasure Against Automated Cyberattacks

September 28, 2015 – Nashville, Tenn. – Magnus Cloud announced today general availability of version 2.0 of its cloud-based service that represents a significant breakthrough in defending against the most dangerous cyberattacks, including sophisticated bot-based attacks at Layer 7/application layer. Magnus offers the first and only active countermeasure solution at scale, removing bots from the field…

Details

Attrition Models and Asymmetric Cyberwarfare

In 1999 two colonels in the People’s Liberation Army (PLA) published their treatise, “Unrestricted Warfare” which details asymmetric strategies for defeating opponents that have technological or numerical superiority over your own forces. Cyberwarfare is explicitly called out, identifying the internet and computers in general as a new, fifth domain of warfare (in addition to land,…

Details

SEC Charges 32 in Insider Trading on Earnings Statements Hacks

This one popped up recently…a good example of the dangers in, and for criminals the advantages of, knowing something that few others know. In this case, newswire firms (not named, but firms like Reuters or Bloomberg) customarily receive embargoed press releases announcing companies’ quarterly earnings for general availability at a particular point in the future. This…

Details