cybersecurity-tomorrow

48 Articles 0 Followers


VShield 2020 Cybersecurity Conference

21 May 2020 1 minute read 0 comments Matthew Rosenquist

The VShield 2020 virtual conference is a can’t-miss cybersecurity event!  Friday May 22nd Bruce Schneier is delivering the keynote and multiple rooms/tracks will be available with many great sessions and informative panels.  I have the honor of bein...

Carding: what is it?

7 Jan 2020 1 minute read 2 comments Ilcarp

Carding is the exchange and sale of credit cards (their data, not the physical cards.) And their use to buy online or, more difficultly, to transfer the money present in them. The markets that sell credit cards are manifold and almost all are found i...

Exploit kits: what they are and how to defend yourself

6 Jan 2020 1 minute read 1 comment Ilcarp

Let's start by explaining what exploits are. An exploit is any type of script or virus that exploits vulnerabilities to create unexpected behaviors in a software, and through appropriate commands, make it perform actions not originally foreseen.All t...

Cryptocurrency Exchange Hacks are on the Rise

9 Dec 2019 2 minute read 13 comments Matthew Rosenquist

Seven major cryptocurrency exchanges were victimized in 2019, totaling over $160 million in financial theft.  As predicted, cybercriminal hackers targeted crypto exchanges in 2019 and the trend will continue into 2020.    Crypto exchanges are relati...

Hackers Scan Massive Docker Instances to Mine Crypto

27 Nov 2019 1 minute read 0 comments Matthew Rosenquist

Hackers are at it again, looking for vulnerable Docker instances so they can selfishly mine Monero.  Over the weekend, according to cybersecurity researchers at Bad Packets, what is believed to be a concerted effort to scan for known vulnerabilities...

Hacking Phones: How Law Enforcement Is Saving Privacy

20 Nov 2019 3 minute read 0 comments Matthew Rosenquist

It's no longer true that society must choose to either weaken everybody's privacy or let criminals run rampant.   As a staunch privacy advocate, I am excited that law enforcement now has access to tools to decrypt locked smartphones! But, wait! Is...

Google Nearly released 100k Health Files Without Consent

16 Nov 2019 1 minute read 0 comments Matthew Rosenquist

Google almost released 100k chest X-ray files, as part of an Artificial Intelligence project.  The National Institutes of Health stepped in and advised of the potential violation which halted the exposure of data.  This is another example of how the...

Government Spies on Digital Services – The Bigger Risks

7 Nov 2019 1 minute read 0 comments Matthew Rosenquist

Twitter employees charged with spying for Saudi Arabia, providing users personal and identity information.  The New York Times has a good write-up. The same can happen with cryptocurrency exchanges, online services, and all manner of digital social...

Government Panic Button for Internet Isolation

1 Nov 2019 1 minute read 0 comments Matthew Rosenquist

Russia moves forward with the recently approved “Sovereign Internet” law that will enable the government to disconnect the nation’s networks from the main Internet in times of a security emergency.  In theory, Russia would be able to operate indepen...

Cryptomining Malware Moves into Software Containers

18 Oct 2019 1 minute read 2 comments Matthew Rosenquist

Security researchers at Palo Alto Networks have discovered the Graboid worm that spreads through Docker software containers and mines Monero cryptocurrency for the attackers.  This is a new tactic and territory for crypto-mining worms.  It is the fi...