Cybersecurity and Hospitals
Hospitals have an exceptionally important role in society-to provide medical treatment. If this is not important enough, taxing the staff, budgetary constraints, and operations in general, there is the COVID-19. To add to this mountain of woe is in one instance is Beaumont Hospital announcing a data breach from last year. Beaumont Health is Michigan’s largest healthcare system. Incident In May 2019, the Beaumont Health System email system was breached by an unauthorized third
Cybersecurity and the Ford/Volkswagen Hack
Vehicles are becoming increasingly connected and complicated. The modules/equipment in the vehicle along with the connectivity makes the newer vehicles targets with many attack vectors. With these advances, the consumer would think cybersecurity would be the first thing on the engineer’s mind. Unfortunately, this is not always the case. It is likewise notable, there are many laws and statutes directed at the vehicles for emissions and other aspects of the vehicle. While these
Cybersecurity and Connected/Autonomous Vehicles
Vehicle cybersecurity continues to grow in pertinence. This is especially the case with the CAV (connected and autonomous vehicle) as these advancements in technology application and improves in performance. The connected vehicles are already in place and used on the road. The autonomous vehicles are still being developed and tested. There will be a time when the scenes in movies, e.g. iRobot with the fleets of self-driving cars, are in place with the vehicles communicating w
Cybersecurity and Corvid19 Scams
Those with evil intent often take advantage of chaos to advance their nefarious interests. With Corvid19 causing so much turmoil in our nation and around the global, it is a perfect time for hackers to strike. They are using several pathways to attack but there are three prominent avenues we need to be watchful of. Stimulus Check – Millions of Americans are expecting to receive a much needed check from the government. That check can arrive via direct deposit or through the po
Cybersecurity and Mobile Gaming
Mobile gaming is an exciting field to work in and play in. With the processing of phones currently,
there is not the lag present years ago. There are many companies that create
these games. One of these is Zynga. Zynga is a social online game developer. The
company became popular approximately a decade ago with the mobile game
Farmville. They also own Words with Friends, Zynga Poker, Mafia Wars, and Café World. Data Exfiltrated The Zynga website was successfully attacked.
Cybersecurity and AI
The chances of the number of cyberattacks decreasing is …zero, nada, null, nil, etc. Likewise, the chances of the types of attacks are exceptionally small. As the years have passed, especially the last seven, the number of attacks has skyrocketed. One general attack accounting for a significant number of these have been the ransomware and BEC attacks. There are also too many individual attacks on large corporations published daily and weekly. Affected persons for each comprom
Cybersecurity and Flawed CPUs
We all know the importance of chips in IT and embedded systems. Without the processing power, we would have many boat anchors sitting around collecting dust. One manufacturer, Intel, is in the news once again. New Warning Issued Research is being done on different platforms across the world. There are labs actively seeking viable exploits on the equipment, from the chip to the system level. In this case, Positive Technologies researched this issue and detected the exploit wit