United States Cybersecurity Magazine

ProcessBolt
From the Summer 2022 Issue

Enterprise IoT is Currently Extremely Inadequate – But it Doesn’t Have To Be

Author(s):

Brian Contos, Chief Security Officer, Phosphorus Cybersecurity

The state of Internet of Things (IoT) security across the enterprise and government agencies is shockingly bad. IoT devices are highly vulnerable; therefore, making organizations vulnerable. In many ways enterprise IoT security today is like IT security in the early 1990’s with poor asset inventories, limited patching, and weak credentials, which is to say, enterprise … Read more

From the Fall 2020 Issue

Guidelines for Identifying Social Engineering Techniques Associated With COVID-19

Author(s):

Jeanna Bray, Freelance Training Consultant, Author

social-engineering-guidelines

Cybercriminals do not empathize with global health emergencies. They take advantage of any situation they can profit from. Such is the case with the current COVID-19 outbreak. This is aggravated by the stress that organizations in the Healthcare and Logistics sectors are under. The overload they experience makes them a much more vulnerable target, and … Read more

Logic Bombs: How to Prevent Them

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Logic Bomb concept, illustrating logic bombs, tick tock, white time bomb

A logic bomb is a piece of malicious code that hackers insert into a software or operating system. This code lies dormant until a specific condition occurs. These conditions could be a pre-determined time (often referred to also as a time bomb) or a specific command that the user types in. Once the conditions occur, … Read more

Cybercriminals in Movies and TV Shows

Author(s):

Frankie Wallace, ,

cybercriminals, hacker dude in a movie or tv show cybercriminals

Hollywood has long held a certain image of cybercriminals. What they look like, how they commit their crimes, and their motivations. However, like many things in Hollywood, the portrayal of hackers and cybercrime in general often misses the mark. A lone-wolf hacker takes on a corrupt corporation. They simultaneously drain their enemies bank accounts while … Read more

Deepfake Technology: Implications for the Future

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

It has been over a year since Jordan Peele made a video warning us of the impending spike in deepfake technology. In the video, Peele uses ML technology and his legendary Obama imitation to effectively ventriloquize Obama. He effectively makes it appear as if Obama is saying outlandish statements. Since the video’s release, we have … Read more

Denial of Service: Access Denied

Author(s):

Patrick Putman, ,

Denial of Service, girl at laptop, access denied

As an internet user, you have likely experienced an interruption in service at some point. Maybe your favorite website was unavailable. Or perhaps your internet service was completely down. Sometimes this happens due to scheduled maintenance. Other times it happens due to hardware or software issues. However, interruptions are occasionally the result of what is … Read more

Watering Hole Attacks: The Tainted Oasis

Author(s):

Josh Henry, ,

Antelopes at a Watering Hole in the desert drinking

Watering Hole Attacks: The Tainted Oasis Watering hole attacks are still wreaking havoc on targeted groups and institutions around the globe. These attacks target major corporations and financial institutions. However, now they are penetrating these corporations’ servers by trapping a single user. The Name In the wild, there are many predators that lurk in the … Read more

Defense Against Man-In-The-Middle Attacks (MITM)

Author(s):

Jack Warner, ,

MITM, malicious figure stealing card info from a computer, ransomware

What You Need For The Best Defense Against Man-In-The-Middle (MITM) Attacks Man-in-the-middle (MITM) attacks involve the interception of communication between two or more digital systems. Because of this, they are both difficult to detect and to resolve. The best solution, therefore, is defense. Unfortunately, that too has its’ challenges due to a varied range of … Read more

ElsaGate: The Problem With Algorithms

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Elsagate concept, kids on IPads looking shocked and confused

Social Engineering can take many forms. Sometimes it’s a phone call attempting to extrapolate your mother’s maiden name. Other times it is an email attempting to gain rapport and get you to click on a sketchy link.  However, sometimes you get something much more bizarre. Something like Elsagate. In 2017, many news sources started reporting … Read more