Doug Vitale Tech Blog

Latest IT news and commentary

Why the Next Denial-of-Service Attack Could Be Against Your Car

IEEE Spectrum, 28 Oct 2016 – Charlie Miller, currently an engineer at Uber, pointed out the difference between two categories of car hacks: hacks limited to the mobile app or to the head unit (the centerpiece of the audio system), and hacks that reach into the car’s controller area network (CAN) bus. The latter are significantly more dangerous because brakes, steering, and other critical controls connect to the CAN bus. [More]


October 2016 – 142,160,000 records leaked

ITGovernance.co.uk, 27 Oct 2016 – October is Cyber Security Awareness Month and what better way to demonstrate awareness than by announcing that over 140 million records were leaked in October (and that’s just the ones we know about)? [More]


ZCash Will Be a Truly Anonymous Blockchain-Based Currency

IEEE Spectrum, 25 Oct 2016 – ZCash is identical to Bitcoin in a lot of ways. It’s founded on a digital ledger of transactions called a blockchain that exists on an army of computers that can be anywhere in the world. But it differs from Bitcoin in one critical way: it will be completely anonymous. Although privacy was a motivating factor for Bitcoin’s flock of early adopters, it doesn’t deliver the goods. For those who want to digitally replicate the experience of slipping on a ski mask and handing over an envelope of unmarked bills, ZCash is the new way to go. [More]


Major internet problems reported after cyberattack on Dyn

Mashable, 21 Oct 2016 – Sites across the internet had problems on Friday morning following a cyberattack on a major internet management company. On Friday morning, Dyn — a company that hosts domain name systems — announced it has been the subject of a cyberattack that caused major problems for numerous websites. People reported issues with Twitter, Spotify, SoundCloud, Vox Media sites, Airbnb and numerous other sites. [More]


Yahoo may have allowed US gov to search user emails

NetworkWorld, 4 Oct 2016 – Yahoo has reportedly searched through all of its users’ incoming emails with a secret software program that’s designed to ferret out information for U.S. government agencies. The software program, which was created last year, has scanned hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, according to a Tuesday report from Reuters. [More]


73% of companies using vulnerable end-of-life networking devices

CIO, 28 Sep 2016 – Seventy-three percent of companies are using vulnerable, end-of-life networking equipment, up from 60 percent last year, according to a new analysis of more than 212,000 Cisco networking devices at 350 organizations across North America. Meanwhile, the share of devices that are end-of-life rose from 4 percent in 2015 to 6 percent this year. [More]


New Ethernet standard brings 5X the speed without cable changes

InfoWorld, 27 Sep 2016 – As expected the IEEE has ratified a new Ethernet specification — IEEE P802.3bz — that defines 2.5Gbase-T and 5Gbase-T, boosting the current top speed of traditional Ethernet five times without requiring the tearing out of current cabling. [More]


The Internet of Fewer Things

IEEE Insight, 23 Sep 2016 – Early predictions of 50 billion connected devices by 2020 are being scaled back. That’s likely because it’s the third quarter of 2016, and we’re nowhere near 1 trillion IoT devices—or even 50 billion for that matter. [More]


Hacker-Proof Code Confirmed

Quanta, 20 Sep 2016 – In the summer of 2015 a team of hackers attempted to take control of an unmanned military helicopter known as Little Bird. Even though the Red Team was given six weeks with the drone and more access to its computing network than genuine bad actors could ever expect to attain, they failed to crack Little Bird’s defenses. [More]


Cyber Gridlock

IEEE Insight, 20 Sep 2016 – What are the chances of a cyberattack shutting down one of the three North American electrical power grids? Or even part of one? There are those who think it about as likely as was deemed the unthinkable attack on Pearl Harbor, while others strongly believe it is not a matter of if, but rather when. And what would be the consequences? In our large cities and even their suburbs, initial discomfort could quickly grow to a general panic as supplies of food, water, medicine, and gasoline are exhausted. Because of the interconnectedness of local power companies in each of the national grids, the notion of an entire grid being affected is not beyond consideration. [More]


Archive (search for keywords with site search engine)

2016
July – August 2016
May – June 2016
March – April 2016
January – February 2016

2015
November – December 2015
September – October 2015
July – August 2015
May – June 2015
March – April 2015
January – February 2015

2014
November – December 2014
September – October 2014
July – August 2014
May – June 2014
March – April 2014
January – February 2014

2013
November – December 2013
September – October 2013
July – August 2013
May – June 2013

Written by Doug Vitale

July 31, 2013 at 12:13 PM

%d bloggers like this: