Archive

Blog search

Archive: October 2020
photo

How Secure Is Your Server Hardware?

Posted on October 13, 2020
Category: Cloud Computing

Security is always evolving and what worked yesterday will not necessarily work today. Security goes far beyond protecting software and networks. Securing your hardware is often overlooked and can have some costly implications, if it becomes compromised. Relying solely on firewalls to secure the infrastructure is bound to end in disaster.  Read More


photo

The Department of Homeland Security announced in early November that a Trojan horse malware program has been installed within the system that operates the majority of the country’s critical infrastructure. Were such a program to succeed in shutting down the system, it could cause economic chaos. Officials with DHS believe the malicious software was installed by hackers sponsored by the Russian government, ABC News reported.  Read More

photo

FDA releases cybersecurity guidance for device manufacturers

Posted on November 06, 2014 0 comments
Category: Cybersecurity

In late October, the Food and Drug Administration released guidelines for medical device manufacturers to follow in regards to cybersecurity. According to agency spokeswoman Jennifer Rodriguez, the information was provided in an effort to specify what exactly is expected of device manufacturers when it comes to security.  Read More

No one is denying that the U.S. is currently facing major cyberthreats, but according to the head of the National Security Agency, many don’t realize the obstacles in the country’s way to protect against cybercrime. In a speech at Stanford University in early November, NSA director and commander of U.S. Cyber Command Admiral Mike Rogers noted that the intelligence community has been tasked with overcoming multiple hurdles, including responding the concerns of data privacy and the inability to lure skilled security professionals to work for the government with high salaries.  Read More

photo

As the Ebola epidemic rages on in West Africa, the doctors and aid workers operating in the region are doing so without access to the necessary tracking and communication systems that allow for a successful disaster response. In order to better equip these workers and stop the spread of the virus, the U.S. Army is deploying tactical networks and mission command capabilities in the area. This will provide volunteers with the infrastructure required to improve communications between U.S. Africa Command, deployed units, non-governmental organizations and other partners involved in Operation United Assistance. Among the systems being enhanced by the Department of Defense are email, video and satellite tracking, Nextgov reported.  Read More

photo

Newly discovered Poodle flaw threatens encrypted data

Posted on October 24, 2014 0 comments
Category: Cybersecurity

Researchers at Google recently uncovered a major flaw in the SSLv3 encryption protocol. The vulnerability is nicknamed Poodle – an acronym for Padding Oracle on Downgraded Legacy Encryption – and attacks exploiting it rely in large part on the ability to force target browsers to fall back to the legacy protocol. The browsers inherently include weaknesses that hackers can take advantage of to access encrypted information.  Read More

photo

US-CERT warns of phishing scams exploiting fears of Ebola virus

Posted on October 22, 2014 0 comments
Category:

An alert has been issued by the Department of Homeland security warning citizens about online fraud schemes using information on Ebola to trick victims into clicking on malicious links. In a statement about the phishing campaigns, the U.S. Computer Emergency Readiness Team warned users to be cautious of opening emails regarding stories about the Ebola virus as they may contain dangerous material.  Read More