By Bill Green, Technical Director at global EMS provider EC Electronics. The IoT (Internet of Things) already connects many devices. In fact, the concept is growing so rapidly, who knows how many connected devices there will eventually be? Until recently, these devices have mostly run on the same networks and protocols that support mobile communications […]
Archives for July 2020
Optimize Existing Technologies for Maximum Value
Looking to get a bigger bang from your budget? Think about optimizing some of your existing IT resources. Budgets are tight these days, yet IT demands keep growing, driven by the challenges presented by the COVID-19 pandemic, and the need to keep pace with competitors in a harsh business environment. Image: Monkey Business – stock.adobe.com […]
‘Doki’ malware attacks Docker servers using Dogecoin
See related Misconfigured Docker API ports are being scanned and exploited by a threat that’s evolved from the Ngrok Botnet campaign Malware that has remained undetected for six months is exploiting misconfigured Docker API ports to launch malicious payloads, while abusing the Dogecoin cryptocurrency blockchain in the process. The malware, known as ‘Doki’, is targeting misconfigured […]
Managed medical device cloud accelerates remote patient care
Telephone and video consultations have become much more commonplace, benefiting both patients and clinicians. However, should a doctor need to remotely measure vital signs during a consultation, or remotely monitor a patient’s condition over a longer period, they would be challenged to provide a frictionless experience for the patient. If devices are successfully deployed and […]
The ETSI IoT standard: are regulators doing enough to protect IoT devices?
The announcement of a new standard for Internet of Things (IoT) security by the ETSI technical committee in June 2020 was very much welcome in the infosec industry. ETSI EN 303 645 puts in place a security baseline for internet-connected products, and lays out 13 provisions outlining the steps manufacturers can take to secure devices and ensure […]
Billions of Devices Impacted by Secure Boot Bypass
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
Critical Bugs in Utilities VPNs Could Cause Physical Damage
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
Open Source Tool Detects ‘Shadow’ Cloud Admin Accounts
News Open Source Tool Detects ‘Shadow’ Cloud Admin Accounts By David Ramel 07/29/2020 Cybersecurity specialist CyberArk is publicizing the problem of “Shadow Admins” — or hidden admin users — on cloud platforms, introducing an open source tool to combat the problem. That problem, the company said, is that attackers can use hidden admin accounts to […]
Matching skills to the right job: Preparing for a new economy
<!– –> Share this post: Over the last few years, employers have become less interested in what degrees people have and more interested in what actual skills they possess. But there’s one challenge with that: it’s hard to know what skills someone truly has. You can look at resumes and at jobs or social media […]
How Machine Learning is Influencing Diversity & Inclusion
Here’s how IT leaders can better manage the bias that becomes embedded in algorithms and datasets to help increase opportunities for minority tech professionals. Our society is in a technological paradox. Life events for many people are increasingly influenced by algorithmic decisions, yet we are discovering how those very essential algorithms discriminate. Because of that […]