Stay ConXted“Fuzzy” IoT, IIoT & ICS Logic: How Hackers can use poorly designed Protocols to mess up your life.A study of 4.8 billion automated security “fuzzing” tests has raised red flags around the security of industrial control system protocols…Dec 4, 2018Dec 4, 2018
Stay ConXtedHow your MSP may be “APT”-ly putting your credentials at risk.In a recent alert issued by the U.S. Computer Emergency Readiness Team (US-CERT), the “National Cybersecurity and Communications…Oct 24, 2018Oct 24, 2018
Stay ConXtedConXtedTechTalk - Leveraging AI using streaming IoT Datasets: A Full Stack Approach.Static IoT datasets are often used for Machine Learning or Deep Learning applications. However, some of the more meaningful analysis is…Oct 13, 2018Oct 13, 2018
Stay ConXtedRogue Chips Sink Ships: Where to start with embedded security.Embedded processor security is a multifaceted, complex subject. With the ascent of the IoT and the ubiquity of embedded systems, hackers…Oct 12, 2018Oct 12, 2018
Stay ConXtedSomewhere in the World it’s 5 o’clock. Do you know where your credentials are?Secureworks® Counter Threat Unit™ (CTU) researchers recently reported evidence of a broad credential-stealing campaign using…Oct 10, 2018Oct 10, 2018
Stay ConXtedMicrochip-Level Authentication: Could it Prevent the “Stealth Doorway” from Opening again?In an October 2018 article in Bloomberg Businessweek, “The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies,” journalists…Oct 9, 2018Oct 9, 2018
Stay ConXtedHow Hacker’s Breached the Facebook “Maginot Line”Today, most people know the Maginot Line as one of history’s biggest boondoggles. Constructed at a massive cost to the French government…Oct 7, 2018Oct 7, 2018