-
Ahmed A. Alkaysi commented on the post, “FAA Advisory Body Recommends Cybersecurity Measures”, on the site 8 years, 1 month ago
Rarely do we talk about cyber security in terms of our actual safety, its usually more about our privacy. However, with the advent of electric cars, drones, and any other electrical device that can harm a person, I think a lot of people will start to take cyber security more seriously. It is good to see the aviation industry being pro-active to…[Read more]
-
Ahmed A. Alkaysi posted a new activity comment 8 years, 1 month ago
Very interesting article. It’s scary to think that 1 Tbps attacks will become “commonplace” when we can barely defend against 100s of Gbps. I think the best way to defend against these kind of attacks is to make sure IoTs are better secured with strong passwords so that they won’t become part of the botnet in the first place.
-
Ahmed A. Alkaysi commented on the post, Your Biggest Cybersecurity Weakness Is Your Phone, on the site 8 years, 1 month ago
Mobile security is absolutely necessary in the corporate world, and I don’t think companies are taking it seriously. My work has a policy where you cannot take any pictures on company premises, but I won’t say if there are any other policies in place. I think one of the most basic things employees need to do is avoid putting confidential work…[Read more]
-
Ahmed A. Alkaysi wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
I posted an article about how SWIFT was going to start punishing their customer banks by disclosing the bank’s security gap in order to get them to comply. Well it looks like SWIFT is now trying to provide these […]
-
Ahmed A. Alkaysi wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 2 months ago
Hello everyone,
I have attached my executive summary, powerpoint, and embeded the video of the presentation below. I apologize, for some reason the Webex recording did not capture my camera, so only my […]
-
Ahmed A. Alkaysi posted a new activity comment 8 years, 2 months ago
I am actually surprised that only 6,000 infections are “live” even though the app has only a half million installs. It is very interesting and scary to hear that the malware is smart enough to not activate itself and do anything detrimental until it is “calling the shots” and 2 hrs have passed. One has to wonder what other malware is hidden in the…[Read more]
-
Ahmed A. Alkaysi commented on the post, Cyber-Security regulations issues by Newyork state department of financial services, on the site 8 years, 2 months ago
To be honest, I would be worried if a financial institution did not have these controls in place already. Why is this just now mandatory? Things like: Establishing a cyber security program and policy, conduct assessments and pen testing, and establish written incident response plan as stated in the article should already exist. If I was a CEO of a…[Read more]
-
Ahmed A. Alkaysi commented on the post, Insider Threats, on the site 8 years, 2 months ago
Interesting article. At my company we deal with PII data. Employees aren’t allowed to bring any storage devices such as USB or external hard drives, The flow of information into and out of the company networks are being regularly monitored and we can’t send any attachments externally through email. If there is any PII data being sent in…[Read more]
-
Ahmed A. Alkaysi posted a new activity comment 8 years, 2 months ago
Hi Jason,
It’s a shame really that the FBI refuse to cooperate and share details of the flaw with Apple. This is a disservice to the millions of iPhone users. I wonder if they had to sign some sort of disclosure not to provide details to Apple if they agreed to use this hack. Whatever the case might be, refusing to share this information does…[Read more]
-
Ahmed A. Alkaysi wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 2 months ago
Volkswagen has teamed up with an Israeli group to launch a cybersecurity company. This company is called Cymotive and will be headquarted in both Israel and Germany. The Cymotive chairman said:
“Together with […]
-
Interesting article Ahmed. I am curious as to how much of Cymotive services and solutions will be used/shared across the automobile industry or whether they will exclusively support Volkswagen. It’s apparent that there is a lot of investment in securing autonomous vehicles across the industry, however I wonder how much of this investment is occurring silos.
In many industries, such as the financial industry, security leaders maintain that security should not be considered a competitive advantage. Therefore, information sharing forums are established to collaborate on security issues. Hopefully the same approach will be taken in the automobile industry.
-
Yeah even I came across this article and we can get an idea of how much the automobile companies are gearing up to tackle car security.There is also an 4th annual automotive cyber security summit to be held in Sanfransisco in Oct last week where the leading automobile giants gonna discuss the new emerging issue of ensuring cyber security in the automobiles
-
Ahmed,
This is a very interesting article. With cars becoming “smarter” and addressing all of the needs of consumers, such as Bluetooth, GPS, Wi-Fi, compatibility with smart devices, automobiles are very susceptible to cyber attacks. I believe we will begin to see more companies such as this popping up in the future, and automotive companies partnering with cyber-security firms. -
As far as I know, each car manufacturer uses proprietary coding in their systems. We know this from the hot rodeos that have put together reprogrammers for various cars. They have indicated that each manufacturer has to be reverse engineered separately. Some hardware is shared, but not all. So… I’m thinking there will be limited opportunity to share solutions specific solutions between manufacturers.
Wade
-
-
Ahmed A. Alkaysi commented on the post, How much of a risk is BYOD to network security?, on the site 8 years, 2 months ago
At work we use a VDI to do anything work related. Even if we bring a our own device, we still need to login to the VDI using our RSA tokens. Obvoiusly the VDI isn’t as great performance wise, it solves a lot of the security issues with having to do work on your own device.
-
Ahmed A. Alkaysi commented on the post, Finally an indicator that you’re on an unsecure site, on the site 8 years, 2 months ago
I have seen sites that are not secured by HTTPS, to have the HTTPS red and cross out in the URL. I have also received prompts upon entering the site that it is an unsecured connection and will need to go through a couple hoops in order to bypass it. Not sure if it a Chrome thing by default or a plugin.
-
Ahmed A. Alkaysi posted a new activity comment 8 years, 2 months ago
Honestly, I wouldn’t be very comfortable at all selling this malware. Any government in the world can buy this malware and make a case that they are doing it for the “safety” of the public or to counter the terrorists. However, the reality is they will use this malware to further whatever agenda they have. If there is a strong enough case to try…[Read more]
-
Ahmed A. Alkaysi posted a new activity comment 8 years, 2 months ago
I used to have a Wells Fargo account, but because they charged me 2 bogus fees I ended up closing the account. What Wells Fargo did is nothing short of stupid. However, I am not going to blame the actual employees that did this. I will blame the lack of IT controls, ethics, and low morals that this company promotes.
These kind of issues start…[Read more]
-
Ahmed A. Alkaysi commented on the post, 2 Israeli teens have been arrested for allegedly running a huge hacking tool, on the site 8 years, 2 months ago
It’s a shame really, although they caught these guys, there are still so many people out their that sell these type of services. They are available all over the darkweb. Nothing the authorities can do other than to continue looking for these types of people, but even if they end up being caught, there are other alternatives.
-
Ahmed A. Alkaysi commented on the post, Data Manipulation: An Imminent Threat, on the site 8 years, 2 months ago
This is very scary indeed. Altering the data wouldn’t only be a simple thing such as a cosmetic issue, it will also be a functional issue with potential to lose the company millions of dollars. Without getting into too much detail, where I work this type of data is used to authorize transaction made by credit cards. If any of the data is altered,…[Read more]
-
Ahmed A. Alkaysi wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 2 months ago
This article talks about how Yelp is offering up to $15,000 in a new “Bug Bounty” program for security researchers. Any of the Yelp owned sites is part of this program. Yelp is particularly worried […]
-
Ahmed A. Alkaysi posted a new activity comment 8 years, 2 months ago
I totally agree with your statement that paying the ransom will “encourage more ransomware campaigns..” However, I remember reading an article a few months back where a hospital”s information system was basically held hostage until a ransom was paid. It is one thing if a company like Target experienced a data breach, but it something entirely…[Read more]
-
Ahmed A. Alkaysi's profile was updated 8 years, 2 months ago
-
Ahmed A. Alkaysi posted a new activity comment 8 years, 2 months ago
Great article Silas. The company I work for brought in a speaker to talk machine learning for cyber. The idea behind it is to automate tasks that a human might do. For instance, in the case of incident response where there was a network breach. Instead of having a human do the analysis on what and how something was stolen, and patching the system,…[Read more]
- Load More