A vulnerability in Cisco’s widely deployed IOS software that was disclosed in the recent WikiLeaks dump of CIA exploits has triggered the company to release a critical warning for its Catalyst networking customers.
Michael Cooney |
21 Mar |
Read more
In an attempt to address such anxieties Cisco today announced Umbrella, a secure, cloud-based gateway, based on technology from OpenDNS and other technologies it acquired such as CloudLock as well as existing Cisco security services that together ultimately promises to offer secure business access to resources even when users are not using the safety of a VPN.
Michael Cooney |
10 Feb |
Read more
Interestingly the TSA finds some amusement or amazement in these finding as it now posts its own Top 10 Most Unusual Finds which outlines the most “dangerous and often times wacky items” it has kept off commercial airliners.
Michael Cooney |
24 Jan |
Read more
IBM Watson goes to the enterprise with 40 companies now adding smarts to the cognitive system.
Michael Cooney |
07 Dec |
Read more
IBM says common Session Initiation Protocol (SIP) and SIP and Cisco Skinny Client Control Protocol (SCCP) are most common targets.
Michael Cooney |
01 Dec |
Read more
Sen. Mark Warner sent letters to FCC, FTC and DHS to find out what can be done to prevent attacks like the one that hit Dyn; how defend against botnet attacks like Mirai’s.
Michael Cooney |
26 Oct |
Read more
The DARPA-developed Space Surveillance Telescope (SST) will this week get a new permanent home at the Air Force Space Command where it promises to rapidly bolster the nation’s ability to more quickly spot and track faint objects in space.
Michael Cooney |
18 Oct |
Read more
Two high-profile airline technology meltdowns stranding thousands of travelers in the past couple weeks have prompted two US senators to push carriers to bolster their technology.
Senators Richard Blumenthal (D-Conn.) and Edward J. Markey (D-Mass.)this week sent a letter to the most recent offenders -- Delta and Southwest -- as well as 11 other airlines to get a better handle on whether or not their information technology systems are reliable and resilient.
Michael Cooney |
17 Aug |
Read more
Cisco’s security intelligence and research group Talos, said that it had reported a serious vulnerability in Rockwell Automation’s industrial control system – the MicroLogix 1400 programmable logic controller (PLC).
The Simple Network Management Protocol exploit could let an attacker take complete remote control of the MicroLogix system and modify the device firmware, letting an invader run his own malicious code on the device.
Michael Cooney |
16 Aug |
Read more
IRS sees increased automated calls and new tactics from scammers demanding tax payments on iTunes and other gift cards.
Michael Cooney |
03 Aug |
Read more
Cisco UCS Performance Manager versions 2.0.0 and prior are affected and the problem is resolved in Cisco UCS Performance Manager versions 2.0.1 and later. UCS Performance Manager collects information about UCS servers, network, storage, and virtual machines.
Michael Cooney |
21 Jul |
Read more
GAO report cites lack of coordination between feds and civilian authorities in event of significant cyber assault
Michael Cooney |
06 Apr |
Read more
Access control is a complicated technology that’s key to strong security.
Michael Cooney |
17 Nov |
Read more
The FTC’s PrivacyCon will include brief privacy and security research presentations, along with expert panel discussions on the latest privacy and security challenges facing consumers. Whitehat researchers and academics will discuss the latest security vulnerabilities, explain how they can be exploited to harm consumers, and highlight research affecting consumer privacy and data security.
Michael Cooney |
28 Aug |
Read more
The DARPA program, called Extreme DDoS Defense (XD3) looks to :
• thwart DDoS attacks by dispersing cyber assets (physically and/or logically) to complicate adversarial targeting
• disguise the characteristics and behaviors of those assets to confuse or deceive the adversary
• blunt the effects of attacks that succeed in penetrating other defensive measures by using adaptive mitigation techniques on endpoints such as mission‐critical servers.
Michael Cooney |
26 Aug |
Read more