NSA contractor charged with stealing top secret data

“Rep. Adam B. Schiff (Calif.), the ranking Democrat on the House Intelligence Committee, said in a statement that Martin’s arrest made it ‘painfully clear that the Intelligence Community still has much to do to institutionalize reforms designed to protect in advance the nation’s sources and methods from insider threats.'”

Read more: https://www.washingtonpost.com/world/national-security/government-contractor-arrested-for-stealing-top-secret-data/2016/10/05/99eeb62a-8b19-11e6-875e-2c1bfe943b66_story.html

Posted in Uncategorized | Leave a comment

BBC News: Malware-infected USB sticks in Australia

“USB staustralian_usbsicks containing harmful malware have been left in Australian letterboxes, police in Victoria have warned.

…The devices are “extremely harmful” and should not be used, police say.

It is not uncommon for USB sticks to be used to carry and transmit destructive malware and viruses to computers.

Cybersecurity experts have called the technology “critically flawed“, and in 2014 demonstrated to the BBC how any USB device could be used to infect a computer without the user’s knowledge.”

Read more: http://www.bbc.co.uk/news/technology-37431335

Posted in Uncategorized | Leave a comment

Gigavation featured at flagship Detroit Automotive Conference


Gigavation thought leadership on cyber security panel at flagship Detroit Automotive Conference

Read more:


Posted in Uncategorized | Leave a comment

Caution: Cyber Risks Ahead for Connected Cars

“From sensors to computers to communications networks, the technology in automobiles today exposes them to an alarming array of potential cyberattacks.”

“By exploiting weaknesses in wireless communications systems or in devices that connect directly to cars (such as smartphones, insurance dongles, or diagnostic tools), hackers could conceivably gain access to data stored on a vehicle that describes its owner’s driving habits, current location, entertainment preferences, or daily schedule.”

“Newer connected vehicles represent an emerging target for hackers because these vehicles are essentially rolling ecosystems of unsecured technologies.”

Read more: http://deloitte.wsj.com/cio/2016/04/18/caution-cyber-risks-ahead-for-connected-cars/

Posted in Uncategorized | Leave a comment

Industrial Hacking: How Cyber Crime Went Pro

TheStreet_Feb2016“The scope, frequency and severity of hacks have increased with every passing year. One of the driving factors behind this, say security experts is a new corporatization and professionalism of hackers. …

‘The stealing of corporate meetings and notes to get a competitive advantage is ridiculously real,’ Barone added, ‘They’re stealing blueprints, because they want to see where this company is going to build next and what their security infrastructure looks like behind it.

Law firms, designers, factories, anyone who can have potentially valuable information can be a target.”

Read more: http://www.thestreet.com/story/13446854/1/industrial-hacking-how-cyber-crime-went-pro.html

Posted in Uncategorized | Leave a comment

“Internet of Things security is so bad, there’s a search engine for sleeping kids”

“Shodan, a search engine for the Internet of Things (IoT), recently launched a new section that lets users easily browse vulnerable webcams.”

“The cameras are vulnerable because they use the Real Time Streaming Protocol (RTSP, port 554) to share video but have no password authentication in place.”

“The consumers are saying ‘we’re not supposed to know anything about this stuff [cybersecurity],” he said. “The vendors don’t want to lift a finger to help users because it costs them money.”

“The bigger picture here is not just personal privacy, but the security of IoT devices,” security researcher Scott Erven told Ars Technica UK. “As we expand that connectivity, when we get into systems that affect public safety and human life—medical devices, the automotive space, critical infrastructure—the consequences of failure are higher than something as shocking as a Shodan webcam peering into the baby’s crib.”

Read More: http://arstechnica.com/security/2016/01/how-to-search-the-internet-of-things-for-photos-of-sleeping-babies/?utm_source=twitterfeed&utm_medium=linkedin

Posted in Uncategorized | Leave a comment

Security Flaw Compromises Location of Nest Thermostat Owners

Nest Thermostat“A security bug discovered by Princeton researchers leaked the location information of Nest Thermostat owners over the Internet.”

“This is not the first security vulnerability from Google’s sister company, Nest, and its first child, the Nest Learning Thermostat. Last year we reported on a 15-second USB hack that would give hackers full remote controls and access to information on the daily whereabouts of owners.”

“Even with these findings Grover considered Nest’s Thermostat to be “one of the more secure devices” in his test. It is not the sort of title that would instill confidence in the security of our future technology.”

Read More: http://www.msn.com/en-us/news/technology/security-flaw-compromises-location-of-nest-thermostat-owners/ar-BBoyymM

Posted in Uncategorized | Leave a comment

Gigavation featured on Keynote Panel on Cybersecurity at Automotive Conference

Gigavation leadership: Keynote Speaker on the Cybersecurity panel at the Automotive USA 2015 Conference alongside OEMs and other telematics experts.


Atlanta, November 16-17, 2015



Posted in Uncategorized | Leave a comment

“Devices need a fresh approach and a new way of thinking about security”

“‘Cybersecurity is an absolute top priority for automakers,’ said Wade Newton, a spokesman for the Alliance of Automobile Manufacturers, a trade group representing the world’s largest car makers.”

“‘The CAN bus is hopelessly insecure,’ Fisher said. It was developed decades before cars were connected to the Internet and lacks features to block malware programs or reject commands from unauthorized intruders.”

“The low-cost chips used in many Internet of Things devices lack built-in security features…”

“…Sadowski said he believes that Internet of Things developers would benefit from the same kind of crisis mentality. ‘I think we do need a rallying cry like that,’ he said. ‘Many of the developers are probably thinking features first, security second.  . . . What we really need to do is educate the developers and the users as to the potential risks.'”

Read more: http://www.betaboston.com/news/2015/08/03/after-car-hack-internet-of-things-looks-riskier/


Posted in Uncategorized | Leave a comment

“Hackers Remotely Kill a Jeep on the Highway”

“Drivers shouldn’t have to choose between being connected and being protected.”

Charlie Miller, a security researcher at Twitter, and Chris Valasek, director of Vehicle Security Research at IOActive, have exposed the security vulnerabilities in automobiles by hacking into cars remotely, controlling the cars' various controls from the radio volume to the brakes. Photographed on Wednesday, July 1, 2015 in Ladue, Mo. (Photo © Whitney Curtis for WIRED.com)

“‘This might be the kind of software bug most likely to kill someone.’ In fact, Miller and Valasek aren’t the first to hack a car over the Internet. In 2011 a team of researchers from the University of Washington and the University of California at San Diego showed that they could wirelessly disable the locks and brakes on a sedan. But those academics took a more discreet approach, keeping the identity of the hacked car secret and sharing the details of the exploit only with carmakers.”

Read more: http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/

Posted in Uncategorized | Leave a comment