News
Episode 226: The Cyber Consequences Of Our Throw Away Culture

We speak with John Shegerian of ERI about his new book: “The Insecurity of Everything” and how our e-waste may be exposing sensitive data to other nations. The post Episode 226: The...

Read more
News
Episode 224: Engineering Trust In The Cyber Executive Order

In this spotlight edition of the podcast, sponsored by Trusted Computing Group* Thomas Hardjono and Henk Birkholz join us to talk about President Biden’s Cyber Executive Order and how the EO’s call...

Read more
News
Privacy Tip #297 – Vulnerability in Smart Home Devices Including Baby Monitors

Mandiant, a division of FireEye, has reported that it has discovered a vulnerability in a software protocol that enables hackers to gain access to audio and visual data on smart devices...

Read more
News
DEF CON: Security Holes in Deere, Case IH Shine Spotlight on Agriculture Cyber Risk

A demonstration at DEF CON of glaring flaws in software by agricultural equipment giants John Deere and Case IH raise the specter of remote, software-based attacks that could cripple farms and...

Read more
News
Episode 220: Unpacking The Kaseya Attack And Securing Device Identities on the IoT

In this episode of the podcast, sponsored by Trusted Computing Group we dig deep on this week’s ransomware attack on the Kaseya IT management software with Adam Meyers of CrowdStrike and...

Read more
News
Episode 218: Denial of Sustenance Attacks -The Cyber Risk To Agriculture

Forget about Colonial Pipeline and JBS. A coordinated cyber attack on U.S. agriculture could, in short order, lead to foot shortages and hunger in the U.S. and abroad. And history has...

Read more
News
Episode 215-2: Leave the Gun, Take the McFlurry

In part II of our interview with Jeremy O’Sullivan of the IoT startup Kytch. We hear about how what Kytch revealed about Taylor’s soft ice cream hardware put him at odds...

Read more
News
Episode 215-1: Jeremy O’Sullivan of Kytch On The Tech Serving McDonald’s Ice Cream Monopoly

Jeremy O’Sullivan, co-founder of the IoT analytics company, Kytch brings us the cautionary tale of his company’s travails with the commercial ice cream machine manufacturer, Taylor, whose equipment is used by...

Read more
News
Deere John: Researcher Warns Ag Giant’s Site Provides a Map to Customers, Equipment

Software vulnerabilities in web sites operated by John Deere could allow a remote attacker to harvest information on the company’s customers including their names, physical addresses and the equipment they own....

Read more
Infosec
Is your dishwasher trying to kill you?

Does every device in your home really need to be connected to the internet? And could your smart appliance be turned against you? The post Is your dishwasher trying to kill you? appeared first on WeLiveSecurity

Read more