Open SMTP (Email) Servers on Your Network

Do you know if you have open SMTP servers on your network? In May, Qualys released 21 vulnerabilities to Exim (see Qualys Security Advisory 21Nails: Multiple vulnerabilities in Exim). Exim is a popular Mail Transfer Agent (MTA) available on Unix operating systems and comes pre-installed on Linux distributions. The easy access and wide SMTP/Exim MTAs use Read More

Flagging Mail Messages in the new iPadOS

Flagging Mail Messages in the new iPadOS turned into one of those “WTF” moments in my first iPadOS experience. Yes, sometimes the process of improvement can create unexpected frustrations. Here, Apple could have done a better job letting people know of a change that required “habits” to shift in order to gain new functionality.   Read More

Breakthrough IOT Security to Secure Smart Cities

The Global Cyber Alliance (GCA) announced their latest IOT Security tool. Automated IoT Defence Ecosystem (AIDE) is a platform built for IOT vendors and researchers. IOT is powerful capability that will be developed by innovators all over the world. The 25 billion by 2021 is a drastic underestimate. The IOT security threat is also underestimated. Read More

What Stops a Nation-State BGP Hijack?

Can Nation-State BGP Hijack Parts of the Internet? Yes, a Nation-State BGP Hijack is a threat on the Internet. Nation-States can orchestrate the manipulation of the Border Gateway Protocol (BGP) via “hacked routers all over the world. These routers would then be used to inject bad, misconfigured, or non-authorized routes all over the world. The result Read More

A Deep DNS Dive on the Recent Widespread DNS…

In February 2019, Brian Krebs Deep DNS Dive updated the world about a new type of “DNS-based Man-in-the-Middle” attack.  A Deep Dive on the Recent Widespread DNS Hijacking Attacks summarizes two reports. The first from Cisco Talos’s DNSpionage Campaign Targets the Middle East. The second is from Mandient Global DNS Hijacking Campaign: DNS Record Manipulation Read More

Security Collaboration – How do you start?

We see weekly posts, pontifications announcements, and proclamations about the need for greater security collaboration. Many times, the organizations and groups who are posting these “aspirations” fail to take the collaboration to the next step. They are not sure how to break into productive security collaboration. In the security community, “productive security collaboration” is built Read More

5G Latency – Reality Checks

The industry is flooded with a lot of “5G will save the planet” without doing the homework to understand what is going on. It is shocking to see disinformation statements that “5G is expected to slash data transmission delays from about 30 milliseconds to less than one.” Yes! 5G defines the law of physics! 5G Read More