by John

In an interesting turn, Hajime is a vigilante-style project intended to disrupt Mirai and similar IoT botnets.

Posted in Criminal, Exploits & Attacks, IoT, IIoT, ICS-SCADA

by John

Posted in Cool-Stuff

by John

Posted in Cool-Stuff

by John

Elad Yoran writes a SC Magazine blog relating what’s in the news to your privacy and personal devices.

Posted in Cybersecurity & Infosec

by John

The Shadow Brokers released nation-state NSA exploits and Rapid7 researchers explain what this means in a concise article, worth a read.

Posted in Criminal, Exploits & Attacks

by John

Posted in Criminal, Exploits & Attacks

by John

http://www.physics-astronomy.com/2015/02/lockheed-martins-new-compact-fusion.html

Lockheed Martin has a compact fusion reactor prototype that holds promise. Can they accomplish in a 5 years what physicists have failed to do (sustained fusion) in 50 years?

Posted in Nuclear, Science

by John

Think about it. We’ve been sending spacecraft into orbit and beyond for 50 years. Information security was not a primary concern. Many of these systems are IoT devices, in practice, and they won’t all have strong authentication processes or be updatable, so what is the impact if someone hacks a NASA probe? NASA chief has big concerns.

Posted in Exploits & Attacks, IoT, IIoT, ICS-SCADA