By John Kinkopf Our guest speaker at the August general meeting was Robert Hurlbut, an independent software security consultant, and co-host of the Application Security Podcast. Robert delivered an excellent talk that covered many aspects of the wide field of software security. An expert in the … [Read more...]
August 2017 – Introduction to Personal Digital Security and Privacy
With Robert Hurlbut Robert Hurlbut Consulting Services Date: Tuesday, August 1st, 7:30 p.m. Location: Danbury Hospital Creasy Auditorium Online privacy, security and anonymity are frequent topics of networking conversations at DACS meetings. There are many reasons we might want to conceal … [Read more...]
The Encryption Debate Should End Right Now
In their endless search for the quick fix, politicians forget that strong encryption is what keeps us safe every day. Without strong encryption, credit card and bank transactions would be open to interception and alteration as they fly across the Internet. Sadly our intelligence agencies have a hard … [Read more...]
The Petya ransomeware may be more malicious than Wannacry
This article from Wired Magazine offers evidence that Petya is a politically-motivated attack. Its primary purpose may be to seal user credentials that would enable future attacks. Is this cyberwar? This article from Healthcare IT News says Petya, initially released in Ukraine, was delivered … [Read more...]
A Cyberattack ‘the World Isn’t Ready For’
My favorite TV genre in the mystery. Cybersecurity has all the same elements: heroes, villains, and clues to how they did it. This article is about a mystery that we missed while the world worried about WannaCry. Read the article... … [Read more...]
Your Home Router may be Vulnerable – Again!
The Internet of Things is striking once again, or more accurately, the IoT is being exploited again for nefarious purposes. The Bad Guys (yes, them again) have taken a reported vulnerability in many home routers and turned it into massive botnets. This article includes a test to see if your router … [Read more...]
The Coolest Hacks Of 2016
Some of these hacks are predictable - the car hack guys up the ante on hacking Jeeps - but some are just, well, cool! Listen to an archived episode from Dard Radio... … [Read more...]
Hacker Lexicon: What Is Perfect Forward Secrecy?
How secret do we need to be? Read this, even your banks website with "https" may not be enough. Read more... … [Read more...]
How to Protect Yourself After the Yahoo Attack
The Yahoo hack affected millions of people. Even if you have not been notified by Yahoo, you should take precautions beginning with changing your password on every site where you used the same password as at Yahoo. Since every one of these new passwords will be unique, you need to set up and use a … [Read more...]
As Elections Loom, Officials Debate How to Protect Voting From Hackers
Normally we avoid posting anything that smacks of politics here, DACS is a 501(c)3 and is limited in its political activities. However, this does not talk about candidates and it dovetails perfectly with the topic of our October General Meeting, voting on the Internet. As you read this article, keep … [Read more...]