Archives for Richard Stiennon

Browsing Security. Again. Major Vulnerability in IE.

security-current

Here we go again. A major zero day vulnerability in a widely deployed application, Internet Explorer, has been discovered. The usual cycle of discovery-disclosure-patch-announcement-exploitation has bee reversed this time. FireEye Research Labs discovered the exploit being actively used in what they have dubbed “Operation Clandestine Fox.”

The fact that a zero day in IE6 through IE11 is actively being exploited induced DHS CERT to warn people to stop using Internet Explorer until a patch is available. Millions of people stopped using IE many versions ago, so they are not impacted by this new attack vector. Of course all browsers have their issues; as Dan Kaminsky Tweeted “All browsers have 0day, and lots of it.”

Full Article


Read More

Richard Stiennon: Security 2014

Growth in spending

IT security spending worldwide will grow by 24% That is an additional $14.4 billion:

  • Encryption and key management will be the fastest growing
  • Security analytics and intelligence will be the second fastest

Congressional Action

Increased NSA oversight will be legislated to quell the outrage.

Once Congress realizes that bills to legalize information sharing are no longer palatable in the wake of the massive surveillance state they have helped create, they will address the fundamental flaws in critical infrastructure protection. Nothing will pass.

New Attacks

Critical Infrastructure will suffer a damaging outage from a targeted attack.

Cloud Computing Platforms, such as AWS or Microsoft Azure will suffer sophisticated attacks to steal computing time and data.

There will be no mobile malware that can spread device to device or from smartphone to corporate network.

A nation state (Iran, North Korea) will use cyber attacks to project force.


Read More

The Year Trust Died on the Internet

2013 The Year Trust Died Online

We had something beautiful. An Internet born of Wild West enthusiasm, fueled by free and unfettered commerce, and just beginning to shape a new world without constraints where sovereign borders meant less and less while human interactions and instantaneous organization meant more and more.

All that died with the revelation from Edward Snowden that in fact the NSA and other intelligence agencies had tapped into the Internet stream to take advantage of an intelligence windfall. The NSA, with a little help from its friends has siphoned off email, texts, phone calls, and geo-location data to spy on practically the whole world. In an unrestrained rush to capture everything it has destroyed everything that made the Internet good.

Where to begin? Apparently the NSA steals data from Microsoft, Google, Yahoo, Apple, and Skype. It taps the undersea fiber optic cables from which it can derive geolocation data for all cell phone calls. It targets the cell phones and email accounts of world leaders. It infiltrates standards bodies such as NIST and the IETF to subvert crypto standards. It bribes vendors of encryption products to use these corrupt standards.

The fall out has been remarkable. Yes, …


Read More

Podcast 1350 Dec. 21, 2013: Cyber Santa and 2013 in Review

Cyber Santa

Show Notes:

Hour 1:

Predictions  2013: How did we do?

2013 in Review

Gary Baker

Gary: 2013 in IT and Enterprise

 

 

2012 EdEd: 2013 for Windows and Microsoft

 

 

2012 CalCal: 2013 for Apple

 

 

Mike BrennanMike Brennan: 2013’s top headlines

 

MiTechNews Report

Mike BrennanWeekly feature with Mike Brennan, editor and publisher of MiTechNews.com, highlighting technology headlines from Michigan and around the world that impact of our state’s growing high tech sector. This MiTechNews report with Mike Brennan is brought to you by  the Engineering Society of Detroit, representing 16,000 engineers in Southeast Michigan. 

keep-calm-and-click-subscribe-2Subscribe to our co-branded MiTechNews Newsletter in collaboration with the Internet Advisor.

Hour 2:

Richard StiennonRichard Stiennon: Security in 2013

 The Year Trust Died Statement

 

Foster Braun

Foster Braun: RIP Balmer and Blackberry

 

Answering Listener Questions

########

Kettle

Click here to donate to Salvation Army holiday fundraiser.

########

Sending Your Questions to the Show During Sports Season

Email Questions to the Internet Advisor’s tech team quickly and simply 24/7.

  • Go to the Contact Us button on our homepage
  • Fill in the required fields
  • Click Send.

Each week we will collect the …


Read More

Podcast 1344 Nov. 9, 2013: Three Hour Special

Internet Advisor Special Broadcast

Hour 1:

cyber-security

Gaylord College Student Wins AT&T App Contest:

Aaron CrawfisAaron Crawfis may have struck gold when he developed a simple locator app for himself and his friends.  The freshman at Notre Dame University impressed AT&T gave him the prize for best app and the sky is the limit.  The app is called Beacon and it is being tested for release after Thanksgiving.

 

NASA busted again!: CyberSecurity Issues in the News

Richard StiennonRichard Stiennon, Executive Editor,  securitycurrent, noted author (Cyber Styletto and SCADA and Me), analyst and international security consultant joins us again to sort out a blizzard of security headlines that have cropped up.  Where is this mess with the NSA heading?  Isn’t every national government that can spying on each other?  Richard has also published a unique book for “kids and management” called SCADA and Me  written by Robert E. Lee.

Hour 2:

prod_surfaceFamily2-1_Page

MS Surface 2 and Surface Pro 2

Jerry CarlsonJerry Carlson, reigning Device Ninja the  Microsoft Heartland District, focuses his time on helping his customers with innovative business solutions, like Ford SYNC, Ford WORKS and other in-vehicle technologies.  Jerry will walk us through the new MS Surface 2 and Surface Pro 2.


Read More

Feb. 16, 2013: Cybersecurity, Microsoft Surface Pro, and MiTech News.com Launch

Show Notes:

Hour 1:

President ObamaPresidential Cybersecurity Directive 21

Richard Stiennon, noted author, cyber security expert and media analyst will discuss Presidential Policy Directive 21: Critical Infrastructure Security and Resilience. PPD 21 how it impacts your privacy and whether it can help save us from cyberwar. Richard is also the author of Up and To the Right: Strategy for Influence.  Richard’s analysis of the President’s directive:  PPD 21: Extreme Risk Management Gone Wrong

bump_logotype Sadie Bascom introduces new app for iPhones and Android phones may make thumb drives obsolete!

 

Entrepreneur-YOU : Tiffany M. Jones, Vice President, Regional Marketing & Communications Manager for Huntington Bank, East Michigan Region shares a vision for encouraging women entrepreneurs in SE Michigan.

Hour 2:

MS-Tech-Center-Opening-with-Gov-John-Fikany-Dave-Sawyer-2-11-1Microsoft Surface Pro Arrives: Dave Sawyer, Heartland Microsoft Technical Center, Technical Director brings this brand new powerful PC in a hybrid tablet form to the studio to discuss its place in technology and possibly in your home.

 

 

 

Getting Windows 8 and Microsoft Office 2013 Straight.  Aaron Guilmette of Apex Digital joins us again as the answer man on all things Windows 8 and explains the mysteries of Office 2013.
MTNew Logo
MiTech News.Com: We launch a …


Read More

Podcast: Dec. 29, 2012 2012 Mayan Misfire Year In Review

Show Notes:

Hour 1:

Mike Amman, President and CEO of the San Joaquin Partnership is a Pioneer Entrepreneur and Technology Analyst.  He looks at trends in 2012 that will set the tone for 2013 in the digital world.  Is wearable computing just over the horizon?  What forces will shape the computers we use and what they can do?

Richard Stiennon, International CyberSecurity Analyst is a frequent expert guest on the show and has consulted companies around the globe on security issues.  2012 was characterized by massive data breaches; will our information be any safer in 2013?  What are the new threats?  How do we protect ourselves?

Aaron Guilimette, VP IT Apex Digital aka. Windows 8 Man will talk about what’s gone right and wrong with Microsoft’s most ambitious remake of their OS in over 20 years.  Tips and tricks to help all those who found a Windows 8 machine in their stocking.Hour 2:

Hour 2:     Predictions 2012, How Did They Do?

Ed Rudel, Cal Carson, Foster Braun and Shane Hamelin face the music and listen to their 2012 Predictions

Hour 3

For live show listeners, call 800-859-0957 toll free during the show.

If you are listening over the Michigan Talk …


Read More

Podcast July 28, 2012: Rick Broida, the Gadget Guy and Sweet Bluetooth Sounds

Show Notes:

Rick Broida

The Gadget Guy, Rick Broida reviews: Bluetooth Speakers DBest duo Bluetooth Speakers and Edifier Primsa BT speakers.

Exclusive Internet Advisor Gadget Guy Deal (visit our Facebook page for details.)

Richard Stiennon: Security Expert, frequent IA guest discusses his newest, self-published book Up and to the RIGHT: Strategy and Tactics of Analyst Influence

  • Twitter for Authors, Artists and Musicians ($.99 on Amazon)
    • Richard’s proven formula for boosting your Twitter followers overnight.


    Internet Advisor Weekly Takeaway: Currently.a free Chrome browser extension that shows your local time, temp and forecast when you open a new tab.

     

    The Mac Minute with Erik Anderson: Apple launches Mountain Lion, major OS change

     

    If you are listening over the Michigan Radio Network or to our Podcasts (subscribe through iTunes) send us an email or drop your question in the Forums.


    Read More

    Cyber Security on a Crash Course with Cyber Warfare

    Richard Stiennon, a noted security expert and frequent guest on the Internet Advisor is concerned about some of the  consequences of the alleged development of the Stuxnet virus by the US high command.  In Operation Olympic Games, Project X, and the assault on the IT security industry, Stiennon expressed his concern that:

    The use of cyber weapons is going to pit the US military and intelligence community against the IT security industry.

    Now companies like F-Secure and Symantec will have to  come up with solid defenses against these kinds of attacks putting them on a collision course with US advanced defense system.


    Read More