Skip to main content

#Technology: Why these attacks are coming

According to a study from HP, 70 percent of IoT devices are currently vulnerable to an attack. While both manufacturers and their customers are certainly working to reduce that, a significant number of IoT devices will still be unprotected in 2017. Additionally, Gartner predicts over 20 billion IoT devices by 2020. Let’s say that in the next three years the number of secure IoT devices doubles, which means that only 40 percent will be insecure. According to Gartner’s estimate that means a total of 8 billion devices by then that are free to be enlisted in a hacker’s arsenal: roughly equivalent to the population of the Earth. That security risk is beyond anything we’ve currently seen in the realm of cybersecurity.
The risk isn’t necessarily coming from the sophistication of attacks but poor security practices of IoT users. Bad practices such as using the default usernames and passwords that are supposed to be used only for setup and then changed, are making it easy for attackers to take those devices and using them as botnets. Companies aren’t doing much to stop this or other potential sources of breaches. A study showed over 90 percent of corporate executives said they cannot read a cybersecurity report and are not prepared to handle a major attack and a stunning 98 percent of the most vulnerable executives have little confidence that their firms constantly monitor devices and users on their systems. It’s clear that most C-Suite executives don’t give cybersecurity enough consideration.
Even more chilling news came from a report back in April, which ranked the U.S. government (including federal, state and local agencies) as having the worst cybersecurity protocols compared to 17 major private industries, including transportation, retail and health care. As these agencies face pressure to virtualize, move to the cloud and embrace connected devices, this lack of security will leave them greatly exposed. I believe that as a result of these vulnerabilities, there is a 50/50 chance that a significant cyber warfare attack is instrumented against the U.S. government, the U.S. military, U.S. critical infrastructure or the U.S. banking infrastructure. This organization will be ill-prepared and vulnerable; it is also likely that the attack won’t originate on IoT devices owned by the government but instead will come from the outside.

Comments

Popular posts from this blog

#Technology: Actress going braless accidentally flashes breasts during interview on Facebook Live

An actress has been left red-faced when she accidentally flashed her  breasts  during a  Facebook  Live broadcast. Argentine star Virginia Gallardo, 29, was about to be interviewed by the actress Flor Vigna, in her Facebook Live program when the huge flash occurred.  www.mirror.co.uk

#Religion: A bitter truth, often glossed over in the name of "tradition," is the religious teachings and the responsibilities of a Muslim woman. Most glossed over is the violence that men are still allowed to inflict on their women in the name of their religion and culture on such a massive part of the planet.

This brutality not only takes place in ISIS-held territory but across most Muslim societies. All around you, you see women killed, molested, imprisoned, maimed and incarcerated while their men sugar-coat the abuse as "modesty", "honour", "divine law" or even "justice". In addition to warning would-be ISIS recruits of the horrors that await them if they jump onto the bandwagon of terrorist organizations, let us take a look into "normal" Muslim societies. Women in Saudi Arabia, in the name of laws and "traditions", are kept effectively non-existent. They are forced, outside the house to wear full-body covering,  abayas . Most full coverings for women are black, which absorbs heat, and are made of non-porous, cloth -- not cotton -- in the scorching heat. Women are also not allowed to drive, they cannot leave the house without a male guardian, they are liable to be flogged, stoned to death or beheaded if found guilty of

#Technology: The media drones immediately went on the attack:

Within hours,  The Washington Post ‘s Eric Wemple called Swann’s report “a gem of video slime”. The Daily Beast ‘s Ben Collins ran a denigrating profile of Benn Swann, calling him a “truther”. Gizmodo ‘s Bryan Menegus published an article calling Swann a “CBS imbecile” who “just fanned the Pizzagate flames for no reason”. Swann’s own station, CBS46, scrubbed his Pizzagate report. You won’t find it listed on  the station’s page on Swann , which shows that Swann’s last “Reality Check” on “ Why reports on Trump are fake news ” was aired on January 12, 2o17, 6 days before the one on Pizzagate. Even more troubling is the fact that, after his Pizzagate report was aired,  Ben Swann disappeared  and was not seen anchoring CBS46’s evening news since.