With a shot below the belt, hackers have taken ransomware to a new level: a hacker used ransomware to take control of Cellmate, a service providing internet-connected chastity cages that are locked and unlocked through an app, and demanded a Bitcoin as ransom to release the, errrr …, hostages. If you’re still confused, read this…
Category: #IoT Internet of Things
How will the #COVID19 #coronavirus #coronapocolypse impact the future of how we do life?
When has society ever moved forward, technologically speaking, and then gone back to the old ways of doing things? Think about the long term impact all of these closings and remote work / school / etc are going to have on our society. Many companies have had long-term plans to implement these things but now…
Why is the FBI Warning About Smart TVs?
Why is the FBI warning about smart TV cybersecurity? Because a smart TV is a computer — it is just built into a really large monitor — and it should be secured like a computer because hackers can hack it just like any other computer. (See FBI Warning) Listen to Shawn Tuma discuss this issue…
Scientists warn brain implants can be hacked and used to control people (and you thought I was kidding?)
Back in early 2012, I wrote a blog post about whether hacking a human would violate the federal Computer Fraud and Abuse Act. Shortly after publishing it, I received a call from a guy in Austin who said: “dude, someone finally gets it, I need your help!” … I responded that I was a lawyer,…
Y2K18? Are #Spectre and #Meltdown the Y2K Apocalypse, Eighteen Years Late?
Hear Shawn Tuma interviewed on News Radio 570 KLIF – Experts: Update Settings and Download Updates to Protect from “Meltdown” and “Spectre” CLICK HERE if you are impatient and only want to know what you should do ASAP to protect against Spectre and Meltdown With Y2K we had a warning. So much of a warning that…
IoT Cybersecurity Improvement Act of 2017 proposed by Senate Cybersecurity Caucus
On August 1, 2017, the Senate Cybersecurity Caucus introduced the “Internet of Things (IoT) Cybersecurity Improvement Act of 2017,” bi-partisan legislation focused on establishing minimum security requirements for the federal procurement of Internet connected devices (#IoT).
FUD and Voting Machine Hacking: An Important Point and Important Lesson
This morning I am doing radio interviews as a Fox News Radio contributor. My topic? The DEFCON Voting Village demonstration of hacking voting machines that have been, or may currently be, used in US elections. Here are a couple of the news stories if you are unfamiliar: Hacking a US electronic voting booth takes less than…
Invitation for 2 Webinars: Protecting Data Exchanged in Discovery and Securing IoT Data
I thought you may like an invitation to attend two complimentary webinars that I will be doing this coming week: YOURS, MINE, OURS: Protecting the Data Gathered and Exchanged in Litigation, Association of Certified E-Discovery Specialists (ACEDS) Monday, August 7, 2017 @ 12:00 CDT LINK for more information FULL VIDEO (see below) Securing IoT Data: Compliance,…
WHDT World News Interviews Shawn Tuma about WikiLeaks’ CIA Vault7
See also: WIKILEAKS’ VAULT7 CIA HACKING TOOLS RELEASE CONUNDRUM: THE POLITICIZATION OF INTELLIGENCE WIKILEAKS AND CIA’S RUSSIAN HACKING TOOLS & TECHNIQUES: WAS IT REALLY THE RUSSIANS?
WikiLeaks and CIA’s Russian Hacking Tools & Techniques: Was it really the Russians?
In the wake of WikiLeaks’ Vault7 release of documents revealing the CIA’s hacking tools, I must revisit a key section of a post from September 2016. The section was about the convenience of blaming “the Russians” given the craze of attributing everything wrong in the cyber world to the seemingly omnipresent “Russians.” See: “SHAME HACKING”…
You must be logged in to post a comment.