DEF CON 2019: Delta ICS Flaw Allows Total Industrial Takeover
The bug exists in a controller that oversees HVAC, lighting, sensor and alarm systems, to name a few.
The bug exists in a controller that oversees HVAC, lighting, sensor and alarm systems, to name a few.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Solutions often meet us at intersections.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
You may not have heard of Kobalt before, but you probably engage with the music it oversees every day, if not almost every hour. Combining a technology platform to better track ownership rights and royalties of songs with a new approach to representing musicians in their careers, Kobalt has risen from the ashes of the…
Researchers from the New York University School of Medicine recently developed a method for manipulating brain waves with light to improve learning. The results of the team’s study are incredible – laboratory mice exposed to the new technique showed marked improvement in short-term memory – but the implications of their findings could radically alter the…
LAS VEGAS – A vulnerability in a popular IoT lock key – used chiefly by a high-end hotel in Europe – allowed researchers to break into hotel rooms. The locks in question are dubbed “mobile keys” because of their reliance on mobile phones as opposed to card-based access such as those based on mag-strips and…
Your phone calls with customers are your business’s greatest untapped resource.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Last updated on August 9, 2019 at 10:11 am With the many changes, Google applies with recent broad core algorithm updates, it’s getting more difficult to rank using spammy tactics. It’s a no-brainer that people should wear white hats and ditch the black hats. Yes, Google’s algorithm is stricter now. If you want to rank,…
Robocall-blocking apps promise to rid your life of spoofed and spam phone calls. But are they as trustworthy as they claim to be? One security researcher said many of these apps can violate your privacy as soon as they are opened. Dan Hastings, a senior security consultant cybersecurity firm NCC Group, analyzed some of the…
Researchers at Zscaler ThreatLabZ have identified a new remote-access trojan (RAT) called Saefko, which retrieves Chrome browser history in a search for cryptocurrency-related activity The RAT, written in .NET and available for sale on the dark web, also looks for information relating to other activities involving credit cards, business, social media, gaming, and online shopping. For context,…
From insecure voting machines to social media misinformation, governments have alot to think about when it comes to securing elections.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea