Navigation Links
Last Week’s Hacker Conventions Showcased the Acceleration of New Threat Vectors & Cyber Vulnerabilities
Date:8/6/2013

New York, NY (PRWEB) August 06, 2013

It’s only natural for cyber-paranoia to creep in when surrounded by some of the world’s best hackers, so there was undoubtedly a lot of that going around last week at the famous annual hacker conventions in Las Vegas, DEF CON and Black Hat. But, as Bob Knudsen, Northeast Regional Manager of Global Digital Forensics says, “it’s certainly not irrational paranoia, it’s anchored real life experiences that make headline news stories all the time, a lot of them really scary stuff. The question is, what are today’s organizations doing to fight those fears?”

Who and what is at cyber risk?

“The short answer is just about everyone, and increasingly, just about everything. The cornerstones of the hacker world are still there concerning networks, like the theft of intellectual property, malicious payloads meant to infect, infiltrate and/or paralyze organizations, stealing Personally Identifiable Information (PII), and a host of other threat vectors everyone is by now familiar with. But now, as technology seeps in to every little nook and cranny of our lives, we’re getting into a stage where things we never thought about getting hacked are also on the menu. Now we have to worry about televisions and gaming systems becoming conduits for cyber espionage, we have to worry about on-board electronics in our vehicles getting hacked and manipulated to the point of possibly becoming dangerous, and we even have to worry about having our electronic medical implants hacked and manipulated,” like renowned hacker Barnaby Jack, who dropped jaws a few years ago by getting an ATM to start spitting out money at the Black Hat conference, was set to demonstrate this year in Las Vegas before his untimely and still mysterious death a little over a week ago. Undoubtedly, the fact that he was about to reveal a cyber-vulnerability which could actually end the life of a real person with a cyber-attack is more than enough fuel to get the gears of conspiracy theorists everywhere going full bore.

Splash the Zeroes … and ones.

“If DEF CON and Black Hat proved one thing, it’s that the craft of hacking never stands still, and neither can the wheels of cyber security, or it will never be a fair fight. Think of it this way. Years ago, or should I say decades, there was a movie called The Final Countdown. The premise of the story was that the USS Nimitz, a modern nuclear powered aircraft carrier, was launched back in time to the days right before the Japanese sneak attack on Pearl Harbor. The storyline of course was hinged on the moral and ethical dilemma of whether or not use their modern technology to change history and the paradox repercussions that could be unleashed if they decided to flex their tech-muscles to change the outcome of an event that changed the world at the time. It would have been F15s at Mach 2 against propeller powered Zeroes, guided missiles against bullets and a sitting duck fleet, all the while being armed with the knowledge of history and knowing exactly what was about to take place, when and where. Essentially, the Japanese fleet would have stood no chance against 40 years of advancements in technology, like when it took just seconds between a ‘splash the Zeroes’ order going out over the radio, to the conformation of ‘two Zeroes splashed’ coming back. They had no chance. But that’s the kind of lopsided fight that unfolds every day in the cyber realm. There are still national infrastructure entities out there relying on SCADA (Supervisory Control and Data Acquisition) systems implemented decades ago, there are still businesses relying on technology that is so out of date it’s like a wide open door to today’s hackers, there are still organizations and institutions out there relying on cyber security plans developed and instituted years ago. And if you need a more real and modern example, just think back to the paralyzing hubbub the Y2K scare caused over a something as simple as incorrectly coded date fields that didn't account for the future. Yesterday’s programmers may have been living on the cutting edge of technology, but that edge gets duller and duller as time passes and technology evolves. So to survive on today’s cyber battlefield, it has never been more important to step at least into the present, but always with both eyes squarely fixed the future. That’s what we help clients do, survive and thrive in today’s landscape of zeroes and ones.”

How to stand tall against the relentless threat.

“To chart a course to where you want to be, you first have to know where you are. Improving your cyber security posture is absolutely no different. Regular cyber threat assessments and comprehensive penetration tests are more important than ever, and ours are designed to do just that, let you know where you stand, where you’re weak, and what needs to be focused on to stand up to today’s cyber threats which are lurking around every corner. A cyber security plan from five years ago probably doesn’t focus at all on threat vectors posed by smartphones and tablets, but they are definitely part of the equation today. Applications designed or purchased just a few years ago may not be up-to-snuff security-wise by today’s standards, and the plethora of cloud-based applications and SaaS (Software as a Service) platforms which have popped up over the last couple of years can pose problems that are most likely not even on the radar of outdated cyber security plans, but they can certainly have grave consequences if exploited. From the big picture, to all the intricacies and details of a client’s unique digital architecture and cyber functionality, including regulatory compliance issues, we shine a spotlight on their weaknesses and help them significantly improve their cyber security posture. Unfortunately, the only thing we can’t do is pick up the phone for them to make the call that gets us started. But even if they waited too long and already got victimized, we have emergency cyber incident responders standing by 24/7, ready to spring into action to take control of the situation and dramatically reduce the consequences and aftermath that inevitably follow a successful cyber-attack, intrusion or breach.”

*Global Digital Forensics is a recognized industry leader in the fields of computer forensics, electronic discovery (eDiscovery), cyber security and emergency incident response, with years of experience assisting clients in the government, banking, healthcare, education and corporate arenas. For a free consultation with a Global Digital Forensics specialist, call 1-800-868-8189 about tailoring a plan which will meet your unique needs. Emergency responders are also standing by 24/7 to handle intrusion and data breach emergencies whenever and wherever they arise. Time is critical if a cyber-incident has occurred, so don’t hesitate to get help. For more information, visit http://www.evestigate.com.

Read the full story at http://www.prweb.com/releases/2013/DEFCON-BlackHat/prweb10998501.htm.


'/>"/>
Source: PRWeb
Copyright©2012 Vocus, Inc.
All rights reserved

Related medicine news :

1. Cellucor to Perform Product Training for Vitamin Shoppe Retail Team at this Week’s Vitamin Shoppe Product Training Expo
2. Hackers' Black Market Profiting at the Expense of US Businesses, Institutions, Agencies and Individuals Alike
3. Jessica Hacker’s Online Couponing Classes Introduced - Set to Take Couponing a Step Further
4. Couponing Made Easier with Jessica Hacker’s Initiative Living on a Coupon
5. Jessica Hacker’s Living on a Coupon Aims to Pounce on the Growing Interest in Couponing
6. Couponing Now Made Easier As Expert Couponer Jessica Hacker Launches Living on a Coupon
7. Jessica Hacker Hoping to Create a Niche - Living on a Coupon Launched
8. Mobile Couponing On the Rise - Jessica Hacker Launches Online Couponing Classes to Let Consumers Maximize Savings
9. Couponing on the Rise -- Jessica Hacker Shares Professional Couponing Tips to Help Maximize Savings
10. Living on a Coupon Launched - Jessica Hacker Aims to Bring Professional Couponing Tips to the Masses
11. Online Couponing Classes Offered by Jessica Hacker to Save Hundreds of Dollars
Post Your Comments:
*Name:
*Comment:
*Email:
(Date:4/30/2016)... , ... April 30, 2016 ... ... CBC News on April 4th, 2016 questioned the use of the HyProCure ... EOTTS-HyProCure as “a controversial procedure.” EOTTS-HyProCure is a minimally invasive procedure performed, ...
(Date:4/29/2016)... ... April 29, 2016 , ... In an article published April ... enthusiasm for Botox and lip injections, which she underwent in order to feel more ... Music and Arts Festival. The article explains that Ms. Mirmelli’s situation is not unique; ...
(Date:4/29/2016)... Georgia (PRWEB) , ... April 29, 2016 , ... On ... rural hospitals across the Southeast, celebrated the signature of Gov. Nathan Deal on SB ... Rep. Geoff Duncan (R - Cumming), offers a 70% tax credit to individuals and ...
(Date:4/29/2016)... ... 29, 2016 , ... Coast Dental Fort Stewart is celebrating its grand opening ... the Exchange Furniture Mall at 112 Vilseck Road in Fort Stewart. There will be ... attendees will have the opportunity to meet general dentists Thomas Richards, DDS, and Josh ...
(Date:4/29/2016)... ... April 29, 2016 , ... World ... the Gyrociser, an exercise invention which aids in proper muscle development. , "The ... CEO and Creative Director of World Patent Marketing. "Globalization has threatened the future ...
Breaking Medicine News(10 mins):
(Date:4/29/2016)... New Jersey , April 29, 2016 /PRNewswire/ ... Software Suite for Life Sciences, Product Development Capabilities ... Global Life Science Customer Base . ... solutions provider, today announced the acquisition of Skura ... a global leader in adaptive sales enablement technology ...
(Date:4/28/2016)...  While Abbott,s announced purchase of St. Jude ... and stent business, healthcare research firm Kalorama Information ... into patient monitoring.  Kalorama said that patient monitoring ... with double-digit growth expected the next 5 years, ... Patient Monitoring . Abbott Laboratories agreed to ...
(Date:4/28/2016)... -- Treato , the single largest ... that it has been named a Cool Vendor by ... Sciences, 2016, Stephen Davies , Michael ... life-science- oriented analytics, algorithms and smart machine technology in ... medication ingestion, and analyze unstructured information.   ...
Breaking Medicine Technology: