-
Mengqi He posted a new activity comment 8 years ago
As a IT security professional, I would be concerned with the threat from a pandemic, and I would put it in company’s continuity plan. A pandemic would be an economic disaster. It would have impacts on stakeholders, employees, partners, consumers, suppliers and communities, and thus disrupt company’s business operation and even the entire sup…[Read more]
-
Mengqi He wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
Microsoft has launched a new security program for its Azure cloud platform to help improve customer’s security when they are dealing with the IoT. It is a response to customer requests fro increased security a […]
-
Mengqi He wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
Recently, researchers have demonstrated that how attackers can cause fatal equipment failures by destroying the integrity of 3D-printed parts. In a proof-of-concept experiment, they sabotaged the 3D printed […]
-
Wow very interesting article Mengqi. This is concerning as 3d printers are becoming mainstream. Good point on the fact that IT experts as well as industry experts would need to work together in order for this type of attack to be successful. I can see how these attacks can be launched by state sponsored actors with a political agenda, as the resources necessary would easily be available. These attacks could also possibly happen if rogue industry experts start selling their skills, like the tools available on the darkweb. Not sure how this could be defended. There would obviously need to be some form of authentication that compares the printed design against the blueprint, which should be locked up somewhere safe.
-
-
Mengqi He wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
People expect public Wi-Fi at nearly all the places we go and expect to be connected all the time. Wi-FI users regularly connect to Wi-Fi in their homes, but they require mobility. According to the survey of […]
-
I am super paranoid about connect to any open Wifi network. It is so easy to hijack an open wifi or just have a fake one setup. It is just not worth the risk to connect to an open network. One thing to keep in mind, even you if decide to connect on open wifi and you might not even check your email or social media, you are still connecting using those accounts since they are working in the background. They will still be vulnerable to theft.
-
This article should be a wake-up call for people who often use public Wi-Fi. These statistic numbers are shocking. The way I see this is similar to the driving and texting problem. People in large numbers are aware of local laws against it, but are willing to take the risk regardless. Therefore, better solutions need to be implemented. A quick solution to this would be for State Officials to enact laws requiring top notch security and encryption for all public places providing Wi-Fi.
-
It wasn’t until I was in this program that I didn’t realize or thought that public hot spots were not safe. I have a totally different outlook on what networks I connect to when I am out. It seems like that organizations need to strengthen their security and strengthen type of encryption that is used for Wi-Fi.
-
-
Mengqi He posted a new activity comment 8 years ago
Quantum computing studies quantum computers that make direct use of quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data. Traditional binary electronic computers are based on transistors, and use electronic current to turn on or off circuits to encode bits. They render data in binary bits that can…[Read more]
-
Mengqi He wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
Recently, many organizations that struggled to deliver strong protection under the pressure of the app economy, decided to compromise on security to get apps released faster. This would be a great risk to both […]
-
Interesting article Mengqi. Companies should do the contrary, making sure their apps are secured before releasing it to the public It doesn’t matter how fast an app is release, if it has security flaws than it will be a terrible product and customers will not use it. Better to be slow and secured, than fast and flawed. As security is now a hot topic, hopefully companies will take their times and build secure apps.
-
-
Mengqi He posted a new activity comment 8 years, 1 month ago
Kerckhoffs’ Principal states that a cryptosystem should be secure even if everything about the system, except the key is public knowledge. This is called “security through transparency” that security is achieved through open source cryptography algorithms. A successful algorithm should be unable to be broken even it has been published or known…[Read more]
-
Mengqi He posted a new activity comment 8 years, 1 month ago
I used Windows for several years and then switched to iOS, and I even never used Linux before this class. Even after using all these three OSs, I can hardly say which one is the best. We only discuss Windows and Linux this time, and let’s compare these one OSs on distros, compatibility, support, user friendliness, costs and security. Firstly, it i…[Read more]
-
Mengqi He posted a new activity comment 8 years, 1 month ago
I used Windows for several years and then switched to iOS, and I even never used Linux before this class. Even after using all these three OSs, I can hardly say which one is the best. We only discuss Windows and Linux this time, and let’s compare these one OSs on distros, compatibility, support, user friendliness, costs and security. Firstly, it i…[Read more]
-
Mengqi He wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
Security vendor FireEye recently published a report describing the carder business of two cyber criminals called “Vendetta Brothers.” The two cyber criminals are likely operating out of Spain and Eastern Eur […]
-
Mengqi He wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
Recently, the RCTA developed drafting guidelines for the security performance standards in the aviation industry. With the guidelines, the Federal Aviation Administration aimed to ensure that cybersecurity […]
-
Rarely do we talk about cyber security in terms of our actual safety, its usually more about our privacy. However, with the advent of electric cars, drones, and any other electrical device that can harm a person, I think a lot of people will start to take cyber security more seriously. It is good to see the aviation industry being pro-active to combat the potential threats to planes by cyber attacks. We should continue to look for ways airplanes are vulnerable and have action plans against it.
-
Due to the high risk involved and the importance of technology in the aviation industry I’m actually surprised that these measures haven’t already been taken. That being said I’m definitely glad that the aviation industry is aware of the significant impact cyber-related issues could have and are taken the necessary steps to help mitigate these incidents proactively with drafting guides and performance standards.
-
Mengqi, a great article, and like Ahmed said, we often think about cyber security in terms of keeping our data safe. This sheds a great light on the fact that our lives are so engulfed with technology, that many moments of our day are at risk! It’s so very scary to think of what people with ill intent could do. We choose to let technology into our life to make it easier, but that comes with a price. That ease can be turned against us!
-
-
Mengqi He posted a new activity comment 8 years, 1 month ago
Ahmed, this is an interesting article that it reminded me of the article I posted in week 1. I agree that security of car’s system and internal network should one of the top concern of car manufacturers, especially when cars are becoming increasingly smart and more rely on the systems inside the cars. Researchers have approved that system v…[Read more]
-
Mengqi He posted a new activity comment 8 years, 1 month ago
I also played Pokemon GO for some time. I was surprised by people’s craze on catching Pokemons. That may be why people downloaded the guide app. To me, the icon of the guide app looks simple,unsophisticated, and even a little suspect. It seems that it was developed by a small company. I usually don’t download apps with wired icons and user i…[Read more]
-
Mengqi He wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
Recently, tech companies including Uber, Dropbox, Twitter, and Docker have joined farce to create the Vendor Security Alliance (VSA) for improving internet security. With the VSA, security experts and compliance […]
-
This is something that many companies are encouraging so as to have shared assessments they can reference instead have having their auditors or security staff asses third parties. If the third party can demonstrate a solid program that is independently assessed they can save a lot of time and money by not having all the companies they do business with individually coming in to perform annual assessments.
Wade
-
One weeks ago, I saw that Yelp was providing a big bounty for people who could find vulnerability in their system. I am glad to see these companies can form an alliance to encourage people who have computer skills. Also, this is a sign of that companies started to value and pay more attentions on cyber security.
-
Mengqi,
Great article. Having a standard questionnaire that companies can use shows that companies are getting serious about their vendor security. If you think about vendors and the data they handle for companies ultimately the organization is as safe as the vendor. If a vendor is unable to handle data safely they are unable to protect customer data. Having this Vendor Security Alliance (VSA) allows organizations to protect both their data and their customer’s data.
-
-
Mengqi He commented on the post, Question for this week, on the site 8 years, 1 month ago
I think Pegasus goes too far from ethical hacking. Even though Pegasus states that all their products are used for making the world a safer place by preventing and investigating crime, what it actually did violated the privacy of Mansoor. I think if Pegasus provides services to countries for only surveilling terrorists, such as Osama bin Laden, it…[Read more]
-
Mengqi He commented on the post, Owners of attack for hire website arrested, on the site 8 years, 2 months ago
I think it was interesting that cyber attackers were unaware of the risk of exposing themselves on social media. They should have the knowledge of how social media can leak personal information through either users themselves or malicious hackers. They didn’t even cover their tracks carefully and clean their attack logs frequently. One thing I was…[Read more]
-
Mengqi He commented on the post, A $50 device and an app can easily steal your PC's log-in, on the site 8 years, 2 months ago
Ioannis, it’s an interesting article. From the video I found that it only took less than 30 seconds to obtain password. Rather than individuals, I think companies should pay more attention to this. Although most companies require employees to lock their screen when they are leaving, it seems not enough now cause obtaining login password is just so…[Read more]
-
Mengqi He wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 2 months ago
Hacking now is so easy that hackers don’t even have to be a technically sophisticated hacker with hacking skills and knowledge, and to deal with the technical challenges to run their own crimeware. In […]
-
Mengqi He commented on the post, Progress Report for Week Ending, March 22, on the site 8 years, 2 months ago
This is an interesting article, Shain. Obviously, what NSO did should not be considered as ethical hacking. The NSO maintained access to the target, used covert channels, exfiltrated data from target’s phone, and also covered its hacking tracks. It went to far beyond ethical hacking. However, I think it is necessary for a country to have certain…[Read more]
-
Mengqi He posted a new activity comment 8 years, 2 months ago
It’s an interesting article, Ryan. Even though changing password is one of the easiest and most effective way to protect our information against hacking, most people would not like to change their password often. It is because people usually don’t have enough awareness of the vulnerability of keeping using the same password. If no one remind them,…[Read more]
- Load More