Lake Worth Zombie Attack
Lake Worth is much like any other community working through the daily operations. Every day was nearly the same as the day before. Unfortunately, there was a power outage on May 20, 2018. As part of the protocol, an alert was sent to the residents. Unfortunately, along with the alert was a message the power outage was due to zombie activity. This was sent at 1:141a-1:45a on Sunday, May 20, 2018. This enduring message was sent to approximately 7,880 residents. The message was
Blockchain applicable to cybersecurity: Not just buzzword bingo
Blockchain has grown in use exponentially over the last few years. People are trying to apply this to virtually anything possible. This phenomena almost appears to be the goose that lays the golden eggs. When the term blockchain is attached to a process, there is the instant attention paid to it. This is prevalent to the extent this is being applied where it may not make the most sense. This being said, one application which may have a useful place for blockchain may be secur
Small Village Targeted for Ransomware
Day after day, Jefferson village simply operated as they did the day before, the day before that, etc. Each day passed without anything exciting occurring. The existence was rather uneventful, which is perfectly acceptable. Ransomware On a fateful day, the last thing on the administration's mind was the system potentially being encrypted and a ransom requested for a decrypt key. In late May 2018, this is what happened (http://www.starbeacon.com/news/locla-news/hackers-try-t0-
Top Phishing Subject Line: “Payment Notification”
Phishing is widely used by many different attackers against their targets. This has historically been a very profitable attack vector. With the low entry cost of phishing emails, and general acceptance of emails, this is an exceptionally flexible tool. This may take many different forms, dependent on the target. If the target is employed in the finance department, the form will be different than a general phishing email campaign against the whole company. These may be tailore
Another keyless vehicle hack: Key fobs to the inverse rescue
Vehicles are synonymous with the US culture. These are pervasive through commercials, print ads, radio, the vast number of vehicles on the road, and various other sources. As these continue to grow in technology being implemented and autonomy, these become more of a target for attack and research. Vehicle and embedded systems cybersecurity is a growing field to complete research in based on this. One relevant, significant attack and the researchers have their 15 minutes of fa
Phishing data sources continue to abound
Phishing data sourcesA cloud is a useful tool for many functions. This has been an asset when used to increase computing processing power. One instance of this has been with databases. The cloud allows for large databases to be stored, and reports generated from this. One such database app is MongoDB. Point of Insecure Data Bob Diachenko, an independent researcher formerly of Krowtech, detected a server which was totally insecure. This was detected using totally legal tools.
Ransomware affects every industry
Ports are exceptionally important to the economy. The shipping across the ocean brings a mass amount of containers with tons of goods, equipment, and other items for sale across the nation. Without this mode of transportation for tangible goods, the economy would slow significantly. These ports are located across the seaboards in the US and across the globe. As these are germane to a successful economy, the ports are natural targets. One such target was the port of San Diego.
Vehicle Cybersecurity Professionals-Still a Difficult Position to Fill
In the metro-Detroit area, the primary industry and revenue force is the auto industry. This is clear due to the number and concentration of the vehicle manufacturer headquarters, assembly plants, and admin offices. As these vehicles are designed and engineered, they require cybersecurity testing. This ensures that as much as possible the vehicles are safe and secure from being successfully attacked. Cybersecurity for present connected vehicles and future autonomous vehicles
BackSwap Returns
The attackers and malware coders have a focus. These persons are looking for data to steal and sell or manipulate. One area which continues to grow in popularity are trojans coded to steal the user’s banking credentials. With this area of expertise, there isn’t merely more of the banking trojans, but adding a nuance to this. The subject malware is BackSwap. Historically this has been successful in compromising targets. The updated version has been targeting Polish users and b