CYBERSECURITY   7384

« earlier    

Review: 6 slick open source routers | InfoWorld
DD-WRT, Tomato, OpenWrt, OPNsense, PFSense, and VyOS suit a wide range of devices and networking needs
router  software  foss  cybersecurity 
3 days ago by bwiese
Twitter
It's a Proactive Day for at the 6th Annual Summit 2018.
Co-founder is the gue…
CyberSecurity  from twitter_favs
4 days ago by ravivyas
Leading RF Security Vulnerabilities in 2018 — Bastille
Wi-FI: Krack
Keyless entry
Medical devices
Remotely hijacking vehicles

"RF vulnerabilities are most often not the result of flaws in operating systems and applications. The problems often reside in the firmware of communications chips, which are trade secrets not open to public inspection. An attack on them bypasses not just network firewalls but many forms of detection. The vulnerable devices are often simple, mass-produced ones, the kind found on the Internet of Things. Many manufacturers pay more attention to price than security."
Bastille  cybersecurity  RF  Wi-Fi  vulnerability 
4 days ago by pierredv
Communications Resiliency | Homeland Security
Technology is a critical tool for improving interoperability that should meet the needs of practitioners on the front lines and should address regional needs, existing infrastructure, cost versus benefits, and sustainability. The resources below provide examples of communications resiliency. Fo
DHS  resilience  cybersecurity  spectrum  Communications 
4 days ago by pierredv
Threat Landscape and Good Practice Guide for Software Defined Networks/5G — ENISA Jan 2016
"This study reviews threats and potential compromises related to the security of SDN/5G networks. More specifically, this report has identified related network assets and the security threats, challenges and risks arising for these assets. Driven by the identified threats and risks, existing security mechanism and and good practices for SDN/5G/NFV has been identified. Finally based in the collated information technical, policy and organizational recommendations for proactively enhancing the security of SDN/5G is provided."

Published
January 27, 2016
security  cybersecurity  cellular  SDR  5G  ENISA  EU 
5 days ago by pierredv
5G Wireless Technology Raises Security Fears - WSJ Sep 2018
Via Dale
By John D. McKinnon
Sept. 12, 2018 10:04 p.m. ET

"Perhaps the biggest concern is the expected flood of connected household devices, many of which already have been hacked and used in denial-of-service attacks, like one in late 2016 that made major services such as Netflix and Twitter unreachable for a day."

"With 5G, the telecommunications system itself will become so central to everyday life that experts fear it will create an ever-larger target for malicious actors. There also are worries that 5G will make it easier for hackers to turn autonomous vehicles, medical procedures and implantable devices into lethal weapons."

"federal officials are working with many device makers—including household and medical device makers—to make it easier to head off attacks."
WSJ  5G  cybersecurity 
5 days ago by pierredv

« earlier    

related tags

&  351  5g  abuse  access  adventurestartshere  ai  analytics  app  apple  apt  attack  attribution  auspol  australian  authentication  authorization  auto  aviation  backdoors  bastille  bigdata  blockchain  blog  botnet  botnets  bots  breaches  browsers  business  c  cellular  centrify  checklist  china  ciberseguridad  cis3360  cis4615  cisco  columbus'  communications  computer  concepts  cop4600  corporate-accountability  crypto  ctf  cyberattacks  cyberbullying  cybercrime  cyberfirst  cyberreason  cybersecurity  cyberthreatintel  dashboard  datascience  dfir  dhs  diameter  digitalmedia  donaldtrump  edtech  electricity  empleo  empleos  employee  encryption  enisa  equifax  equipment  estonia  eu  featured  financial  fingerprinting  fintech  foss  freedom  futureofwork  games  gizmodo.com  google  gop  govtech  gps  hack  hackbacks  hacker  hackers  hacking  hardening  harriscorp  highered  horrorstories  incidentresponse  industry40  infographic  infosec  infrastructure  insiders  insiderthreat  insurance  internet  ioa  ios  iot  iran  it  job  jobs  joshbolton  k12  kernel  language  lavalamps  law  learninganalytics  linux  louis  lte  mac/ios  malware  memory  mitre  mobile  models  monitoring  nac  negligence  network  networking  news  next-gen  nsa  of  organization  passwords  pcap  pentagon  pentesting  phishing  policing  posts  privacy  programming  protocol  qihoo360  ransomware  reconnaissance  reference  reidentification  report  republican  resilience  rf  rise  risk-management  risk  router  sdr  security  siem  smartcontract  snr  soar  software  spectrum  splunk  ss7  standard  stepuptogenv  supply_chain  syllabus  taxii  technology  tesla  the  threathunting  tools  toread  tpm  training  trends  trust  ubuntu  ueba  university  utilities  vicarious_liability  vpn  vulnerability  warren  whatsapp  whitehouse  wi-fi  wsj  zero  zhouhongyi 

Copy this bookmark:



description:


tags: