With a shot below the belt, hackers have taken ransomware to a new level: a hacker used ransomware to take control of Cellmate, a service providing internet-connected chastity cages that are locked and unlocked through an app, and demanded a Bitcoin as ransom to release the, errrr …, hostages. If you’re still confused, read this…
Tag: IoT
Why is the FBI Warning About Smart TVs?
Why is the FBI warning about smart TV cybersecurity? Because a smart TV is a computer — it is just built into a really large monitor — and it should be secured like a computer because hackers can hack it just like any other computer. (See FBI Warning) Listen to Shawn Tuma discuss this issue…
Scientists warn brain implants can be hacked and used to control people (and you thought I was kidding?)
Back in early 2012, I wrote a blog post about whether hacking a human would violate the federal Computer Fraud and Abuse Act. Shortly after publishing it, I received a call from a guy in Austin who said: “dude, someone finally gets it, I need your help!” … I responded that I was a lawyer,…
Complimentary Webinar: Countdown to #GDPR – Compliance for Non-EU Companies
Countdown to GDPR Compliance is a complimentary webinar that I will be moderating on Thursday, December 7, 2017, at 12:00 PM Central. This is the second webinar in a three-part series sponsored by Mackrell International and will focus on Compliance for Non-EU Companies. You don’t want to miss it! Moderator: Shawn Tuma Presenter: Marta Stephanian,…
IoT Cybersecurity Improvement Act of 2017 proposed by Senate Cybersecurity Caucus
On August 1, 2017, the Senate Cybersecurity Caucus introduced the “Internet of Things (IoT) Cybersecurity Improvement Act of 2017,” bi-partisan legislation focused on establishing minimum security requirements for the federal procurement of Internet connected devices (#IoT).
Invitation for 2 Webinars: Protecting Data Exchanged in Discovery and Securing IoT Data
I thought you may like an invitation to attend two complimentary webinars that I will be doing this coming week: YOURS, MINE, OURS: Protecting the Data Gathered and Exchanged in Litigation, Association of Certified E-Discovery Specialists (ACEDS) Monday, August 7, 2017 @ 12:00 CDT LINK for more information FULL VIDEO (see below) Securing IoT Data: Compliance,…
Dyn, Krebs, and Mirai Botnet – the IoT Pandora’s Box is Open, Now What?
usinesses now risk disruption from attacks by a minion army of “smart” IoT devices through DDoS attacks like those experienced by Dyn last Friday, and Brian Krebs in late September. The Mirai IoT botnet made these attacks possible and, because its source code was recently released into the wild, it will likely be used against other companies. Now that this IoT Pandora’s Box has been opened, what do we do?
You Could See This One Coming: Vibrator Company Sued for Tracking Usage
SETTLEMENT UPDATE: A Canadian sex-toy manufacturer, We-Vibe, has been ordered to pay out almost $3 million to customers who bought a “smart vibrator” that tracked owners’ usage without their knowledge. Each customer who used the associated app will be paid $7,433, and customers who bought the vibrator but never used the app can claim up to…
You should know this > “What do connected cars and toilets have in common?”
What do connected cars and toilets have in common? That is the title to a recent Blog Post about an upcoming presentation at VMWorld 2013, Barcelona and, when I read it, I just had to quiz my readers to see who remembered … Come on now, you do know the answer to this question, right? I…
You must be logged in to post a comment.