When a wireless device of any kind sends data from one location to another, the device needs to protect the data just as if it was traveling over a wired network. Unfortunately, that is often not the case as several security researchers proved at Black Hat and Def Con. Tools exist that allowed the researchers to capture data traveling over different types of wireless protocols … [Read more...]
Cyber Blackout – Daily Security Byte EP. 195
Security researchers and Hollywood have long predicted network hacks that could take out the power grid. Well, we may finally have a confirmed example of a blackout caused by a cyber attack in the Ukraine. Watch today's video to learn about this new news and how you might avoid a common trend in advanced attacks. (Episode Runtime: 3:25) Direct YouTube … [Read more...]
North Korean Cyber Killers? – Daily Security Byte EP.91
Today, a North Korean (NK) defector and university professor claimed the NK's Bureau 121 cyber attack group includes 6000 cyber warrior who could destroy cities and cause human casualties. Meanwhile, we also learned that the US government allegedly launched a failed, Stuxnet-like attack against NK back in 2010. How much of this is true, and what do two nations states battling … [Read more...]
Blackhat 2013 – WSWiR Episode 72
Details on Femtocell hacking, Mactans, and SCADA Honeypots This is the week of the Blackhat and Defcon security conferences; two of the biggest security research conferences of the year. So rather than quickly summarize InfoSec news—like I do most weeks—I'll share details about three of my favorite talks from this year's Blackhat show (Defcon is going on now). Two of my … [Read more...]