Navigation Links
Last Week’s Hacker Conventions Showcased the Acceleration of New Threat Vectors & Cyber Vulnerabilities

New York, NY (PRWEB) August 06, 2013

It’s only natural for cyber-paranoia to creep in when surrounded by some of the world’s best hackers, so there was undoubtedly a lot of that going around last week at the famous annual hacker conventions in Las Vegas, DEF CON and Black Hat. But, as Bob Knudsen, Northeast Regional Manager of Global Digital Forensics says, “it’s certainly not irrational paranoia, it’s anchored real life experiences that make headline news stories all the time, a lot of them really scary stuff. The question is, what are today’s organizations doing to fight those fears?”

Who and what is at cyber risk?

“The short answer is just about everyone, and increasingly, just about everything. The cornerstones of the hacker world are still there concerning networks, like the theft of intellectual property, malicious payloads meant to infect, infiltrate and/or paralyze organizations, stealing Personally Identifiable Information (PII), and a host of other threat vectors everyone is by now familiar with. But now, as technology seeps in to every little nook and cranny of our lives, we’re getting into a stage where things we never thought about getting hacked are also on the menu. Now we have to worry about televisions and gaming systems becoming conduits for cyber espionage, we have to worry about on-board electronics in our vehicles getting hacked and manipulated to the point of possibly becoming dangerous, and we even have to worry about having our electronic medical implants hacked and manipulated,” like renowned hacker Barnaby Jack, who dropped jaws a few years ago by getting an ATM to start spitting out money at the Black Hat conference, was set to demonstrate this year in Las Vegas before his untimely and still mysterious death a little over a week ago. Undoubtedly, the fact that he was about to reveal a cyber-vulnerability which could actually end the life of a real person with a cyber-attack is more than enough fuel to get the gears of conspiracy theorists everywhere going full bore.

Splash the Zeroes … and ones.

“If DEF CON and Black Hat proved one thing, it’s that the craft of hacking never stands still, and neither can the wheels of cyber security, or it will never be a fair fight. Think of it this way. Years ago, or should I say decades, there was a movie called The Final Countdown. The premise of the story was that the USS Nimitz, a modern nuclear powered aircraft carrier, was launched back in time to the days right before the Japanese sneak attack on Pearl Harbor. The storyline of course was hinged on the moral and ethical dilemma of whether or not use their modern technology to change history and the paradox repercussions that could be unleashed if they decided to flex their tech-muscles to change the outcome of an event that changed the world at the time. It would have been F15s at Mach 2 against propeller powered Zeroes, guided missiles against bullets and a sitting duck fleet, all the while being armed with the knowledge of history and knowing exactly what was about to take place, when and where. Essentially, the Japanese fleet would have stood no chance against 40 years of advancements in technology, like when it took just seconds between a ‘splash the Zeroes’ order going out over the radio, to the conformation of ‘two Zeroes splashed’ coming back. They had no chance. But that’s the kind of lopsided fight that unfolds every day in the cyber realm. There are still national infrastructure entities out there relying on SCADA (Supervisory Control and Data Acquisition) systems implemented decades ago, there are still businesses relying on technology that is so out of date it’s like a wide open door to today’s hackers, there are still organizations and institutions out there relying on cyber security plans developed and instituted years ago. And if you need a more real and modern example, just think back to the paralyzing hubbub the Y2K scare caused over a something as simple as incorrectly coded date fields that didn't account for the future. Yesterday’s programmers may have been living on the cutting edge of technology, but that edge gets duller and duller as time passes and technology evolves. So to survive on today’s cyber battlefield, it has never been more important to step at least into the present, but always with both eyes squarely fixed the future. That’s what we help clients do, survive and thrive in today’s landscape of zeroes and ones.”

How to stand tall against the relentless threat.

“To chart a course to where you want to be, you first have to know where you are. Improving your cyber security posture is absolutely no different. Regular cyber threat assessments and comprehensive penetration tests are more important than ever, and ours are designed to do just that, let you know where you stand, where you’re weak, and what needs to be focused on to stand up to today’s cyber threats which are lurking around every corner. A cyber security plan from five years ago probably doesn’t focus at all on threat vectors posed by smartphones and tablets, but they are definitely part of the equation today. Applications designed or purchased just a few years ago may not be up-to-snuff security-wise by today’s standards, and the plethora of cloud-based applications and SaaS (Software as a Service) platforms which have popped up over the last couple of years can pose problems that are most likely not even on the radar of outdated cyber security plans, but they can certainly have grave consequences if exploited. From the big picture, to all the intricacies and details of a client’s unique digital architecture and cyber functionality, including regulatory compliance issues, we shine a spotlight on their weaknesses and help them significantly improve their cyber security posture. Unfortunately, the only thing we can’t do is pick up the phone for them to make the call that gets us started. But even if they waited too long and already got victimized, we have emergency cyber incident responders standing by 24/7, ready to spring into action to take control of the situation and dramatically reduce the consequences and aftermath that inevitably follow a successful cyber-attack, intrusion or breach.”

*Global Digital Forensics is a recognized industry leader in the fields of computer forensics, electronic discovery (eDiscovery), cyber security and emergency incident response, with years of experience assisting clients in the government, banking, healthcare, education and corporate arenas. For a free consultation with a Global Digital Forensics specialist, call 1-800-868-8189 about tailoring a plan which will meet your unique needs. Emergency responders are also standing by 24/7 to handle intrusion and data breach emergencies whenever and wherever they arise. Time is critical if a cyber-incident has occurred, so don’t hesitate to get help. For more information, visit

Read the full story at

Source: PRWeb
Copyright©2012 Vocus, Inc.
All rights reserved

Related medicine news :

1. Cellucor to Perform Product Training for Vitamin Shoppe Retail Team at this Week’s Vitamin Shoppe Product Training Expo
2. Hackers' Black Market Profiting at the Expense of US Businesses, Institutions, Agencies and Individuals Alike
3. Jessica Hacker’s Online Couponing Classes Introduced - Set to Take Couponing a Step Further
4. Couponing Made Easier with Jessica Hacker’s Initiative Living on a Coupon
5. Jessica Hacker’s Living on a Coupon Aims to Pounce on the Growing Interest in Couponing
6. Couponing Now Made Easier As Expert Couponer Jessica Hacker Launches Living on a Coupon
7. Jessica Hacker Hoping to Create a Niche - Living on a Coupon Launched
8. Mobile Couponing On the Rise - Jessica Hacker Launches Online Couponing Classes to Let Consumers Maximize Savings
9. Couponing on the Rise -- Jessica Hacker Shares Professional Couponing Tips to Help Maximize Savings
10. Living on a Coupon Launched - Jessica Hacker Aims to Bring Professional Couponing Tips to the Masses
11. Online Couponing Classes Offered by Jessica Hacker to Save Hundreds of Dollars
Post Your Comments:
(Date:11/27/2015)... ... , ... A team of Swiss doctors has released a report on mesothelioma ... posted the findings on the website. Click here to read the details now. ... patients who were treated with chemotherapy followed by EPP surgery. Among the 106 patients ...
(Date:11/27/2015)... , ... November 27, 2015 , ... Lizzie’s Lice Pickers ... company is offering customers 10% off of their purchase of lice treatment product. In ... full price. According to a company spokesperson. “Finding lice is a sure way to ...
(Date:11/27/2015)... ... ... No.1 Herpes-only dating community in the world, revealed that over 50% of its members are ... people under the age of 50 – or 67% of the population - are infected ... HSV-1 infection . , "The data shocks us highly!" said Michelle Li, Co-Founder of ...
(Date:11/27/2015)... ... ... A simply groundbreaking television series, "Voices in America", which is hosted by Hollywood legend, ... that are presently affecting Americans. Dedicated to providing the world with a wide variety ... consumers focus on, one episode at a time. , In the latest installment ...
(Date:11/27/2015)... ... 2015 , ... CBD College is proud to announce that on ... accreditation to its Diagnostic Medical Sonography program. CBD College is honored to join this ... colleges and universities in the state of California make the cut. CBD College is ...
Breaking Medicine News(10 mins):
(Date:11/25/2015)... , Nov. 25, 2015  Amgen (NASDAQ: AMGN ... Application (BLA) with the United States ... 501, a biosimilar candidate to Humira ® (adalimumab). ... application submitted to the FDA and represents Amgen,s first ... Sean E. Harper , M.D., executive vice president of ...
(Date:11/25/2015)... , Nov. 25, 2015 AAIPharma ... planned investment of at least $15.8  Million to ... Wilmington, NC . The expansion will ... to meet the growing demands of the pharmaceutical ... site expansion will provide up to 40,000 ...
(Date:11/25/2015)... N.Y. , Nov. 25, 2015  Henry Schein, ... and services to office-based dental, medical and animal health ... (GNYDM) Meeting the Henry Schein ConnectDental® Pavilion , ... broadest array of open solutions designed to help any ... Click here for a schedule of experts ...
Breaking Medicine Technology: