Is It All A Scan?

Scanning Reality As part of my continuous effort to keep on top of cybersecurity, I was watching a CEH video yesterday which overviewed the various ways in which hackers search for vulnerabilities.  It all came down to the same end result – port scanning. I then...

Truly Secure Mobile Devices

I Can Hear You A recent article brought to light – again – that all of our collective phone calls, texts, and video chats are completely exposed.  This is not new as many articles have discussed the complete lack of security for phone calls.  In fact,...

Iridium Insanity?

Good Luck On Your Flight… Iridium has been around for a long time as our favorite GPS communications network.  Recently Iridium;’s new NEXT platform made the news when it helped the FAA ground Boeing 737 MAX airplanes.  In reading this article, the...

The Correct Huawei

This Is Stupid Recently the U.S. told Germany to drop Huawei (pronounced Wah Way) or lose out on intelligence gathering.  I get that people do not trust this Chinese manufacturer and many think that they are a front for Chinese spying… But this approach is...

Malware of DOOM

Death Malware A recent article discusses how Triton, a particularly devastating form of malware, is taking down safety systems in critical infrastructure.  This malware destroys key mechanisms that act to stop catastrophes such as power plants blowing up, nuclear...