A new week, a new month, and a new Cybersecurity News post! This iteration contains a whopping eight (8) stories covering the last two to four weeks. Since cybersecurity is a diverse field of assorted specializations, we attempt to match that with various stories touching on all aspects of cybersecurity. This time we cover a few breaches, Elon Musk's decision to alter Twitter's … [Read more...]
Thanks for Helping Take Care of Security, Google
By now, most folks should know the difference between hypertext transfer protocol (HTTP) and HTTP secure (HTTPS). If not, HTTP is human-readable content floating through the inner tubes of the magical Internet. HTTPS is an encrypted format of this content, ensuring only involved parties can communicate between each other. The latter is performed by registering a domain name and … [Read more...]
The Seattle CTO Club ~ Sharing Security Information
Yesterday I had the honor of presenting some security information at the Seattle CTO Club. I loosely based the discussion on a similar presentation I gave last week at an event for Equinox IT, a WatchGuard partner, covering the cyber security landscape and top threats businesses face. Members of the group learned common attack patterns and discussed strategies for effectively … [Read more...]
Hacking Door Locks and Car Locks (Or Anything Wireless)
When a wireless device of any kind sends data from one location to another, the device needs to protect the data just as if it was traveling over a wired network. Unfortunately, that is often not the case as several security researchers proved at Black Hat and Def Con. Tools exist that allowed the researchers to capture data traveling over different types of wireless protocols … [Read more...]
Historical Cryptography Ciphers
Like most technologies, encryption has evolved throughout the years from simple origins. While modern encryption relies on complex computational operations, older encryption ciphers were rudimentary and easy to break. Regardless of each cipher’s strength, all encryption methods share a common goal, to encode a readable “plaintext” message in a way that prevents unauthorized … [Read more...]