We usually think of Internet of Things (IoT) devices as smart light bulbs or door locks or cameras, but there are some IoT devices that are a little bigger and a lot more expensive. In this case, it is a multi-million dollar Cat Scanner that hospitals and imaging centers use to create diagnostic images. Siemens […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Voting Village was the place to be at Defcon if you are interested in the security of your vote. The sponsors of the village bought 30 voting machines – many on eBay. Full disclosure – some of these models are no longer in use, but others are still in use. One older (in use until […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Lets combine all the possible cyber risk concerns into one sentence. A bug in an open source library used by major IoT vendors is raising the spectre of software supply chain/vendor risk management issues for all developers. The vendor in question is Axis Communications. Whether you know it or not, you have seen their security cameras across the country including […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
HBO has joined the ranks of Sony and Netflix and has had their new, unreleased shows hacked and posted on the dark web. HBO Chairman and CEO Richard Plepler sent an email to employees saying, in part, “there has been a cyber incident directed at the company”, which I assume, means that they were hacked. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In the continuing saga of Vault 7 – the leaking of CIA hacking tools, Wikileaks made Mac, Linux and Unix users feel welcome. Instead of leaking Windows and Android malicious code, they leaked Mac, Linux and Unix tools instead. I guess they are equal opportunity leakers. In this case they just leaked the manuals so […]
Continue reading →
[DISPLAY_ACURAX_ICONS]