Navigation Links
Last Week’s Hacker Conventions Showcased the Acceleration of New Threat Vectors & Cyber Vulnerabilities

New York, NY (PRWEB) August 06, 2013

It’s only natural for cyber-paranoia to creep in when surrounded by some of the world’s best hackers, so there was undoubtedly a lot of that going around last week at the famous annual hacker conventions in Las Vegas, DEF CON and Black Hat. But, as Bob Knudsen, Northeast Regional Manager of Global Digital Forensics says, “it’s certainly not irrational paranoia, it’s anchored real life experiences that make headline news stories all the time, a lot of them really scary stuff. The question is, what are today’s organizations doing to fight those fears?”

Who and what is at cyber risk?

“The short answer is just about everyone, and increasingly, just about everything. The cornerstones of the hacker world are still there concerning networks, like the theft of intellectual property, malicious payloads meant to infect, infiltrate and/or paralyze organizations, stealing Personally Identifiable Information (PII), and a host of other threat vectors everyone is by now familiar with. But now, as technology seeps in to every little nook and cranny of our lives, we’re getting into a stage where things we never thought about getting hacked are also on the menu. Now we have to worry about televisions and gaming systems becoming conduits for cyber espionage, we have to worry about on-board electronics in our vehicles getting hacked and manipulated to the point of possibly becoming dangerous, and we even have to worry about having our electronic medical implants hacked and manipulated,” like renowned hacker Barnaby Jack, who dropped jaws a few years ago by getting an ATM to start spitting out money at the Black Hat conference, was set to demonstrate this year in Las Vegas before his untimely and still mysterious death a little over a week ago. Undoubtedly, the fact that he was about to reveal a cyber-vulnerability which could actually end the life of a real person with a cyber-attack is more than enough fuel to get the gears of conspiracy theorists everywhere going full bore.

Splash the Zeroes … and ones.

“If DEF CON and Black Hat proved one thing, it’s that the craft of hacking never stands still, and neither can the wheels of cyber security, or it will never be a fair fight. Think of it this way. Years ago, or should I say decades, there was a movie called The Final Countdown. The premise of the story was that the USS Nimitz, a modern nuclear powered aircraft carrier, was launched back in time to the days right before the Japanese sneak attack on Pearl Harbor. The storyline of course was hinged on the moral and ethical dilemma of whether or not use their modern technology to change history and the paradox repercussions that could be unleashed if they decided to flex their tech-muscles to change the outcome of an event that changed the world at the time. It would have been F15s at Mach 2 against propeller powered Zeroes, guided missiles against bullets and a sitting duck fleet, all the while being armed with the knowledge of history and knowing exactly what was about to take place, when and where. Essentially, the Japanese fleet would have stood no chance against 40 years of advancements in technology, like when it took just seconds between a ‘splash the Zeroes’ order going out over the radio, to the conformation of ‘two Zeroes splashed’ coming back. They had no chance. But that’s the kind of lopsided fight that unfolds every day in the cyber realm. There are still national infrastructure entities out there relying on SCADA (Supervisory Control and Data Acquisition) systems implemented decades ago, there are still businesses relying on technology that is so out of date it’s like a wide open door to today’s hackers, there are still organizations and institutions out there relying on cyber security plans developed and instituted years ago. And if you need a more real and modern example, just think back to the paralyzing hubbub the Y2K scare caused over a something as simple as incorrectly coded date fields that didn't account for the future. Yesterday’s programmers may have been living on the cutting edge of technology, but that edge gets duller and duller as time passes and technology evolves. So to survive on today’s cyber battlefield, it has never been more important to step at least into the present, but always with both eyes squarely fixed the future. That’s what we help clients do, survive and thrive in today’s landscape of zeroes and ones.”

How to stand tall against the relentless threat.

“To chart a course to where you want to be, you first have to know where you are. Improving your cyber security posture is absolutely no different. Regular cyber threat assessments and comprehensive penetration tests are more important than ever, and ours are designed to do just that, let you know where you stand, where you’re weak, and what needs to be focused on to stand up to today’s cyber threats which are lurking around every corner. A cyber security plan from five years ago probably doesn’t focus at all on threat vectors posed by smartphones and tablets, but they are definitely part of the equation today. Applications designed or purchased just a few years ago may not be up-to-snuff security-wise by today’s standards, and the plethora of cloud-based applications and SaaS (Software as a Service) platforms which have popped up over the last couple of years can pose problems that are most likely not even on the radar of outdated cyber security plans, but they can certainly have grave consequences if exploited. From the big picture, to all the intricacies and details of a client’s unique digital architecture and cyber functionality, including regulatory compliance issues, we shine a spotlight on their weaknesses and help them significantly improve their cyber security posture. Unfortunately, the only thing we can’t do is pick up the phone for them to make the call that gets us started. But even if they waited too long and already got victimized, we have emergency cyber incident responders standing by 24/7, ready to spring into action to take control of the situation and dramatically reduce the consequences and aftermath that inevitably follow a successful cyber-attack, intrusion or breach.”

*Global Digital Forensics is a recognized industry leader in the fields of computer forensics, electronic discovery (eDiscovery), cyber security and emergency incident response, with years of experience assisting clients in the government, banking, healthcare, education and corporate arenas. For a free consultation with a Global Digital Forensics specialist, call 1-800-868-8189 about tailoring a plan which will meet your unique needs. Emergency responders are also standing by 24/7 to handle intrusion and data breach emergencies whenever and wherever they arise. Time is critical if a cyber-incident has occurred, so don’t hesitate to get help. For more information, visit

Read the full story at

Source: PRWeb
Copyright©2012 Vocus, Inc.
All rights reserved

Related medicine news :

1. Cellucor to Perform Product Training for Vitamin Shoppe Retail Team at this Week’s Vitamin Shoppe Product Training Expo
2. Hackers' Black Market Profiting at the Expense of US Businesses, Institutions, Agencies and Individuals Alike
3. Jessica Hacker’s Online Couponing Classes Introduced - Set to Take Couponing a Step Further
4. Couponing Made Easier with Jessica Hacker’s Initiative Living on a Coupon
5. Jessica Hacker’s Living on a Coupon Aims to Pounce on the Growing Interest in Couponing
6. Couponing Now Made Easier As Expert Couponer Jessica Hacker Launches Living on a Coupon
7. Jessica Hacker Hoping to Create a Niche - Living on a Coupon Launched
8. Mobile Couponing On the Rise - Jessica Hacker Launches Online Couponing Classes to Let Consumers Maximize Savings
9. Couponing on the Rise -- Jessica Hacker Shares Professional Couponing Tips to Help Maximize Savings
10. Living on a Coupon Launched - Jessica Hacker Aims to Bring Professional Couponing Tips to the Masses
11. Online Couponing Classes Offered by Jessica Hacker to Save Hundreds of Dollars
Post Your Comments:
(Date:11/30/2015)... (PRWEB) , ... November 30, ... ... (AIS) is pleased to announce the speakers for “Value-Based Payer-Provider Partnerships: Three ... learned from three innovative value-based care arrangements: Essentia Health and UCare, MissionPoint ...
(Date:11/30/2015)... ... November 30, 2015 , ... Vasont Systems, a top component ... (VUI) extension unites with Syncro Soft’s latest software update, oXygen XML editor Version ... with the latest release of oXygen® XML editor and the Vasont® CCMS. ...
(Date:11/30/2015)... ... November 30, 2015 , ... Scott Newman MD, FACS ... select few plastic surgeons in the New York City area to utilize the ... world’s first heat-induced laser treatment for fat loss in the abdomen, flanks, and ...
(Date:11/30/2015)... ... November 30, 2015 , ... TransPack Volume 6 features 30 customizable ... from scrolling web-styled transitions to wipes with blur & drop shadow options. Utilize ... Seamlessly transition from one clip to the next with TransPack's easily customizable styles. ...
(Date:11/30/2015)... ... November 30, 2015 , ... ... strategic partnership at the Radiological Society of North America (RSNA) 2015 conference. ... providers of cutting-edge dictation and speech-enabled documentation software, announced their partnership today ...
Breaking Medicine News(10 mins):
(Date:11/30/2015)... iCAD, Inc. (Nasdaq: ICAD ) ... solutions for advanced image analysis and workflow tools ... Radiological Society of North American (RSNA) 2015 Annual ... November 29 to December 4, 2015. The company ... automated breast density assessment solution, PowerLook® Advanced Mammography ...
(Date:11/30/2015)... SALT LAKE CITY , Nov. 30, 2015 ... Systems (NYSE: VAR ) will exhibit a broader array ... meeting of the Radiological Society of North America ... The Varian exhibit at the meeting will feature X-ray components ... Cardinal CT tube, a line of products from Varian,s Claymount ...
(Date:11/30/2015)... Nov. 30, 2015  Novartis will demonstrate the strength ... th American Society of Hematology (ASH) Annual Meeting. ... as well as supportive care, including key findings in ... cell therapies. The ASH Annual Meeting will be held ... Novartis Oncology . "We will be presenting ...
Breaking Medicine Technology: