Cyber Security has become a requirement

Not only to protect commerce financially, but also legally...

you are a target

everyone is a victim

demand is growing

it can not be met

figures show

astonishing trends

Right now businesses are being pressured more and more to invest in additional security services in the attempt to keep up with evolving dangers. The consequences of not being prepared are/will be catastrophic for companies and their customers. In the process of deciding how to establish and operate a business, many business owners of varying power and influence hardly take into consideration the guaranteed attack on their information technology investments. If leadership does not lead by example, department managers will be uneasy about delegating to subordinates the required implementation of common sense computing safeguards.

this is JUST THE BEGINNING

the world and almost all technology is connected

With so many people on the planet having access to technology. With so many governments and markets being co-dependent on each other; the negative consequences of computer systems having control over civilization is endangering not only personal identities or payment transactions, but also national infrastructure safety and environmental integrity.

A Human Rights concern

cyber criminals and spies preying on the innocent

Illegal actions against individuals and companies are not only carried out by criminal cells, but also state-sponsored agencies and their non-governmental contracted propagators. Legitimate business operations are being affected by such revelations; this means profits will continue to be hampered if economic activity isn't left alone by the misuse of information technology systems.

Recent Posts

May 25

GDPR Now in Force, Lawsuits Already Filed

The ramifications were visible from day one, with major U.S.-media outlets forced to shutter their websites in parts of Europe. Companies are rushing to renegotiate contracts with suppliers and service providers as they are now liable. Read More...

May 24

Data of Millions of Japanese Sold on Forum

A hacker suspected to be operating out of China has been seen peddling the data of around 200 million Japanese users on an underground cybercrime forum, according to a FireEye iSIGHT Intelligence report. Read More...

May 23

Close to 1m S. Africans' Data Leaked - Again

Barely a year after South Africa's largest data leak was revealed in 2017, the country has suffered yet another data leak as 934,000 personal records of South Africans have been leaked publicly online. Read More...

May 22

Idaho State Gov't Hacked Twice in Three Days

Months after Idaho took steps to beef up its cybersecurity, state government computers fell prey to two attacks in a matter of days. Both events pointed out the importance of keeping up with training and security maintenance. Read More...

May 21

L.A. County Leaks 3.2m Files of Crime Victims

A non-profit organization that operates Los Angeles County's social services hotline has accidentally exposed a trove of personal data and highly sensitive details of people who called to report abuse, crisis incidents, and other crimes. Read More...

Spotlight

Securing Wireless Neuro-stimulators


Keywords: Proprietary wireless communication protocol, black-box reverse engineering, low-cost randomness source, security architecture.

The newest generations of neurostimulators often include wireless capabilities that enable remote monitoring and reprogramming through an external device programmer. While the wireless interface enables more flexible and personalized treatments for patients, it also opens the door for adversaries to conduct software radio-based attacks. If strong security mechanisms are not in place, adversaries could send malicious commands to the neuro-stimulator in order to deliver undesired electrical signals to the patient's brain. Implantable medical devices (IMDs) typically rely on proprietary protocols to wirelessly communicate with external device programmers. In this paper, we fully reverse engineer the proprietary protocol between a device programmer and a widely used commercial neurostimulator from one of the leading IMD manufacturers.

By: Eduard Marin, Dave Singelée, Bohan Yang, Vladimir Volski, Guy A. E. Vandenbosch, Bart Nuttin, and Bart Preneel, — COSIC, KU Leuven, Belgium