Stories by Michael Cooney

Michael Cooney's image

US senators want airline IT meltdowns to end

Two high-profile airline technology meltdowns stranding thousands of travelers in the past couple weeks have prompted two US senators to push carriers to bolster their technology. Senators Richard Blumenthal (D-Conn.) and Edward J. Markey (D-Mass.)this week sent a letter to the most recent offenders -- Delta and Southwest -- as well as 11 other airlines to get a better handle on whether or not their information technology systems are reliable and resilient.

Michael Cooney | 17 Aug | Read more

Cisco uncovers security threat in industrial control system

Cisco’s security intelligence and research group Talos, said that it had reported a serious vulnerability in Rockwell Automation’s industrial control system – the MicroLogix 1400 programmable logic controller (PLC). The Simple Network Management Protocol exploit could let an attacker take complete remote control of the MicroLogix system and modify the device firmware, letting an invader run his own malicious code on the device.

Michael Cooney | 16 Aug | Read more

Attention whitehats, The FTC wants you to lead new privacy, security push

The FTC’s PrivacyCon will include brief privacy and security research presentations, along with expert panel discussions on the latest privacy and security challenges facing consumers. Whitehat researchers and academics will discuss the latest security vulnerabilities, explain how they can be exploited to harm consumers, and highlight research affecting consumer privacy and data security.

Michael Cooney | 28 Aug | Read more

DARPA: Current DDoS protection isn’t cutting it

The DARPA program, called Extreme DDoS Defense (XD3) looks to : • thwart DDoS attacks by dispersing cyber assets (physically and/or logically) to complicate adversarial targeting • disguise the characteristics and behaviors of those assets to confuse or deceive the adversary • blunt the effects of attacks that succeed in penetrating other defensive measures by using adaptive mitigation techniques on endpoints such as mission‐critical servers.

Michael Cooney | 26 Aug | Read more