Thursday, June 27, 2013

Cyber Security: U.S. energy firms vulnerable to cyber attacks

Between April and September 2012, the energy business, which includes oil and gas producers, was hit with more targeted malware attacks than any other industry. Click here to read the article.


Wednesday, June 26, 2013

Cyber Security: Could terrorists remotely crash your car?

Read about the possibility of remote carjacking as car technology continues to advance. According to AOL Autos, "the National Highway Traffic Safety Administration opened up a 'cyber terrorism department' to sort out software issues that could make cars vulnerable to attack."

Tuesday, June 25, 2013

Cyber Security: Could hackers switch off pacemakers?

The FDA has warned medical device manufacturers of a very real and very possible threat: hackers may be able to remotely switch off pacemakers. Read the article here.

Monday, June 24, 2013

Cyber Security: ICS-CERT Vulnerability Summary for Week of June 17

Click the link below to view the summary of cyber security vulnerabilities for the week of June 17 as collected and reported by ICS-CERT.


http://www.us-cert.gov/ncas/bulletins/SB13-175



Thursday, June 20, 2013

Cyber Security: Ransomware virus schemes to steal

A new computer virus referred to as "ransomware" has affected consumer PCs in Central Florida, giving users a message claiming that "pornography has been 'detected' on the computer in violation of a litany of federal statutes." The message says users have 72 hours to pay $300-400 in fines or else a hard drive will be sent to the FBI with evidence of pornography. Read the article here.

Wednesday, June 19, 2013

Cyber Security: Foxboro and Triconex Global Client Conference September 10-13 in San Antonio, TX

Foxboro and Triconex Client Conference

San Antonio Marriot Rivercenter, TX
September 10-13, 2013


As a Foxboro and Triconex user, your plant is future-proofed. This year's conference is all about helping you get the most out of your existing assets, people and processes with an eye towards tomorrow. You'll have the opportunity to learn from a strong heritage of control and safety technologists; collaborate with industry experts on current challenges and user proven solutions and experience innovative technology designed to continuously evolve your plant and your business into the future.
 
Don’t miss keynote speaker Richard A. Clarke - Cyber Security Expert, former Counterterrosrism Czar & best-selling author, and the celebration of Triconex 30 years providing safe, available and secure operations.

Don’t miss out - Register Today!

http://foxboro.com/clientconference
http://triconex.com/clientconference
 
 


Cyber Security: British eavesdropping agency GCHQ hacks foreign diplomats' phones

A well-known British eavesdropping agency, GCHQ, has allegedly been hacking into foreign diplomats' phones during international conferences hosted by the U.K., even going as far as bugging a nearby internet cafĂ© in an attempt "to get an edge in high-stakes negotiation."  Click here to read the article.

Tuesday, June 18, 2013

Cyber Security: 5 signs your computer is infected

5 signs your computer is infected: pop-up ads, phantom messages, locked computer, programs and tools stop working, and more commonly, everything appears fine. Read this article for details on what to look for if your computer becomes infected with malware.


Monday, June 17, 2013

Cyber Security: Instances of hackers demanding ransoms grow

Instances of hackers demanding ransoms have grown exponentially over the last several years. In 2011, there were 18 complaints about the Reveton malware, and in 2012, that number had skyrocketed to almost 2,000. Between 2002 and 2013, individuals have claimed as much as $900,000 in losses.

Click here to read the article.

Cyber Security: ICS-CERT Vulnerability Summary for Week of June 10

Click the link below to view the summary of cyber security vulnerabilities for the week of June 10 as collected and reported by ICS-CERT.


http://www.us-cert.gov/ncas/bulletins/SB13-168



Friday, June 14, 2013

Cyber Security: Researchers claim they can hack Apple devices via USB chargers

Two doctoral students and a staff researcher at Tech's College of Computing said they "were able to bypass Apple software security and install 'arbitrary software'" via a USB charger. Click here to read the article.

Thursday, June 13, 2013

Cyber Security: How to avoid being hacked

Click here to read an article containing helpful suggestions to avoid being hacked, especially during travel.

Wednesday, June 12, 2013

Cyber Security: How your smartphone will identify you privately

Your smartphone can identify you, particularly through dictionary attacks (a history of commonly used words you have typed), simple passwords, and password reuse. Find out how you can better protect yourself by reading the article here.

Tuesday, June 11, 2013

Cyber Security: Amish hackers

Even with limited access to technology, the Amish are finding ways to hack electronics--such as kitchen blenders that run on air pressure--to make them fit into their lifestyle. Click here to read what Amish hackers could teach tech-frenzied American consumers.

Monday, June 10, 2013

Cyber Security: ICS-CERT Vulnerability Summary for Week of June 3

Click the link below to view the summary of cyber security vulnerabilities for the week of June 3 as collected and reported by ICS-CERT.


http://www.us-cert.gov/ncas/bulletins/SB13-161



Friday, June 7, 2013

Cyber Security: Dell tablet winner announced



Thanks to everyone who participated in our blog contest! We appreciate the large number of survey responses and all of your valuable input. As always, at any time, feel free to share your thoughts about our blog topics or provide suggestions for future posts.

Congratulations to the winner of our Dell tablet, Brent H.! We will be in contact with you shortly via email with details.


Thursday, June 6, 2013

Cyber Security: Apple's two-factor authentication leaves holes for hackers

Despite Apple's two-factor authentication process, researchers have found that there are still vulnerabilities that leave user information at risk. The second factor is only required in certain circumstances such as changing account details, seeking support, or making a purchase. "Apple did a half-hearted job," writes Elcomsoft's Vladimir Katalov in the blog post describing the flaws, "Still leaving ways for the intruder to access users’ personal information bypassing the (optionally enabled) two-factor authentication." Click here to read the article.

Wednesday, June 5, 2013

Cyber Security: President Obama to confront China's leader about cyber attacks on U.S.

During the U.S.-China summit on June 7 and 8, President Obama will confront Xi Jinping over a spate of cyber attacks on the US, including the latest allegation that Chinese hackers gained access to more than two dozen of America's most advanced weapons systems. Click here to read the article.

Tuesday, June 4, 2013

Cyber Security: Power companies under a constant state of attack


An Electric Grid Vulnerability report written by the staff of Congressman Edward J. Markey and Henry A. Waxman reveals that power companies feel they are under a constant state of attack, with one power company claiming 10,000 attempted cyber attacks per month. What would you do in a power outage lasting days, weeks, or even months? Click here for the article.

Monday, June 3, 2013