Cyber Attacks on Oil and Gas A few weeks ago, news agencies shared reports on the Energetic Bear attack. This cyber-attack, or rather virus, was reportedly… David Hobbs | July 11, 2014
Anonymous Delivers DDoS to the 2014 World Cup With an estimated viewing audience of over 3.2 billion globally, the 2014 World Cup draws a large amount of viewers… Carl Herberger | June 13, 2014
Consequences of Connection – How Mobile Security Threats Can Reach the IoT Does mobile mean a handheld device in today’s world? Not necessarily. The term ‘mobile’ often applies to a phone or… Carl Herberger | June 12, 2014
A Flaw Worth Fixing? How We Tested (And Stopped) the Facebook Notes Flaw Recently, independent researcher Chaman Thapa published a report on an attack scenario showing how someone could use Facebook Notes to… Ron Meyran | May 19, 2014
WordPress DDoS and other HTTP Reflectors Lately, there has been a lot of buzz about reflection and amplification attacks extending DDoS harm. The new kid on… David Hobbs | March 25, 2014
Was NATO Hit by a DNS Attack? The latest developments in the Russia-Ukraine cyberwar battle have garnered huge media attention. It was also recently revealed that the… Werner Thalmeier | March 24, 2014
Can a Boeing 777 Airliner be Brought Down by a Cyber Attack? Bottom line: It is not only conceivable, but Boeing itself has warned about it. As a former United States Air… Carl Herberger | March 18, 2014
Geopolitics and Cyber: A New War? This week, I was interview by Fox Business on how hacktivism takes center stage when geopolitical tensions rise. (Geopolitical Tensions… Carl Herberger | March 17, 2014
The Ride from RSA 2014 & Taxi Wars The RSA Conference was amazing this year — bigger, more robust and crazier than I have ever seen it. The… David Hobbs | March 6, 2014
Credit Card Breach at a Major U.S. Retailer – Are you one of the 40 Million Targeted? If you’re one of the 40+ million people who went shopping this holiday season at Target, hackers may have stolen… David Hobbs | December 20, 2013
Personal Data – When the Invaluable Falls into the Wrong Hands Recently, the news has listed numerous egregious data thefts from large insurance companies as well as concerns of data security… Carl Herberger | December 9, 2013
Five Indications that an “Electronic Pearl Harbor” is Possible, if not Plausible During the past year, we have become numb to the sheer outrage of cyber-attacks and the devastating impacts they have… Carl Herberger | December 6, 2013