Cybersecurity and Securing Connected Cars
Vehicles abound in society and culture. These vary in age, color, manufacturer, and the amount of tire and brake wear. One topic which has been in the news and talked about recently has been securing these vehicles, especially the connected vehicles now and the future autonomous ones. Seemingly, there are many new articles with these as the story focus. With these vehicles, due to the other assets the vehicle connects to (e.g. V2X, V2I, V2V, V2G, etc.), a successful attack ha
Cybersecurity, Municipalities and Ransomware
Municipalities targeted (still) for ransomware Municipalities provide many services the residents require. This is especially evident in the winter months to the north. Any disruption with these services has the potential to create havoc and a definite issue for the residents and critical services. A town in Washington recently experienced how much “fun” remediating the issue can be. The city of Sammamish in Washington state. This is located east of Seattle in King County and
Cybersecurity and Blockchain
Blockchain seems to have been over the last few years one of the words attracting quite a bit of attention. As the functional attribute providing the backbone for cryptocurrency several new protocols were popping up. A handful were prepared for their introduction, while too many others were not. This was to provide a promise for those investing and using cryptocurrency. With this in place, the crypto currency was safe. This was heralded as the one application of computer scie
Cybersecurity and Cisco Attack
The Cisco name is known across the globe and is highly regarded. A massive amount of engineering has been applied to the product line, and in this case their routers. Targets There were security researchers who detected the Cisco RV 320 and RV 325 WAN routers being scanned and the vulnerabilities attempted to be exploited. Specifically, this was aimed at the RV 320 with versions 1.4.2.15 through 1.4.2.19, and RV 325 versions 1.4.2.15 through 1.4.2.17. These hardware instances
Cybersecurity and National Security
One aspect of our lives is impacted by a particular industry. Without this in place, our lives would be drastically, significantly different. This industry would be the defense industry. Another pertinent function involves the government, which is likewise integral to our society. In the past, these have been attacked successfully and compromised several times through the years. As targets, these continue to be ripe with data and information useful and able to be sold. To acc
Cybersecurity and Healthcare Companies
All is relatively well here at Woesnotgone Meadow, where everyone has above average bandwidth. Generally, people in the Meadow are healthy. We enjoy the outdoors, hiking, and sitting downtown on the benches watching people walk by. At times, though, our residents may need to go to the clinic for various chronic or acute problems. At times Jerry claims Margie is trying to poison him. When we attend the doctor’s, we are required to provide a bit of private and health informatio
Cybersecurity, Mental Health and HIPAA
All is well here at Woesnotgone Meadow, where everyone has above average bandwidth. In the Meadow, the residents and families may need to use county resources every now and again. These various services are readily available. In the Grand Rapids, MI area there is an agency providing mental health services. The services are provided by the Kent County Community Mental Health Authority. The organization is also known as Network 180. Attack Method The system was breached on Octo
Cybersecurity and Municipalities
All is well here at Woesnotgone Meadow, where everyone has above average bandwidth. In the Meadow, we have our municipal office, which manages the Meadow’s business and works with our citizens. The Meadow has maintained its presence under the radar and has been fortunate to not have been attacked. Akron, OH, however, has not been this lucky. The city’s computers were the targets for the attack. As this was successful, ransomware was applied to their system. Curiously, this wa
Cybersecurity, Gaming, and Ransomware
All is well here at Woesnotgone Meadow, where everyone has above average bandwidth. In the Meadow, we certainly play video games. Sometimes by ourselves, other times with our children or grandchildren. We play the racing games, zombie games, and many others. We expect to have a great time with this. What we don’t expect is to be a victim of ransomware. Ransomware The new ransomware, Anatova, has been detected. This was originally detected by McAfee. The research indicates thi