Author Archives: Mark Abssy

Hack The Army 3.0 Starts Today (01/06/2021)

Hack The Army 3.0 Starts Today (01/06/2021)

The Defense Digital Service, a self described “SWAT team of nerds” along with service provider HackerOne are conducting another in a series of bug bounty programs to help organizations identify potential cybersecurity vulnerabilities.

Military and civilian hackers invited to discover and disclose vulnerabilities in digital assets affiliated with the largest branch of the U.S. Military

Source: HackerOne

5G and Edge Computing are Becoming a Common Pairing

5G and Edge Computing are Becoming a Common Pairing

While there have been announcements concerning public edge computing buildouts, this agreement is one of a recent few that focuses on private edge computing services that will serve manufacturers and other heavy users of industrial IoT to manage production.

Samsung Electronics on Wednesday signed a partnership with IBM to combine “edge computing” with private 5G networks, the latest tie-up among big technology firms trying to help customers automate production.

Source: Samsung ties up with IBM to combine private 5G with “edge computing”

U.S. Treasury Cyber Attack

U.S. Treasury Cyber Attack

An assumed nation-state backed group has been monitoring employee emails for some time it was revealed. It is not known yet if access was obtained through a phishing or direct attack on the groups MS Office 365 platform. Officials met Saturday, December 13th to assess the damage and prepare a remedy.

Hackers backed by a foreign government stole information from the U.S. Treasury Department.

Source: U.S. Treasury breached by hackers | CyberNews

Just in Time For 5G – More Streaming!

Just in Time For 5G – More Streaming!

Just when you thought that the digital infrastructure underlying the internet and overall connectivity wasn’t strained enough in the work-from-home, learn-from-home, stay-at-home era, it appears that Google has joined the ranks of direct streaming services switching on direct to YouTube capabilities on its Stadia gaming platform.

Rolling out to some users now, Stadia appears to finally be adding support for direct streaming to YouTube without any extra software.

Source: Stadia YouTube direct streaming is rolling out – 9to5Google

Hershey Accused of Skirting Sustainability Program

Hershey Accused of Skirting Sustainability Program

How do you buy cocoa without buying cocoa? Apparently, through utilizing the cocoa futures market. Hershey seems to step out of some warm milk and into some hot water with its latest approach to procuring cocoa.

Ivory Coast and Ghana are cancelling all cocoa sustainability schemes that U.S.-based Hershey runs in their countries, accusing the chocolate maker of trying to avoid paying a cocoa premium aimed at combating farmer poverty.

Source: Ivory Coast, Ghana cancel cocoa sustainability schemes run by Hershey

SCOTUS to Weigh in on What Constitutes “Hacking”

SCOTUS to Weigh in on What Constitutes “Hacking”

Many people’s go to image for a hacker is some young, hoodie wearing Anonymous collective member who is just as happy cracking your credit card as he is trolling ISIS with LGTBQ postings. Believe it or not, per the U.S. Computer Fraud and Abuse Act of 1986 the odds are good that you fall under the official definition of a “hacker.” Ever share a password for Spotify, Hulu, Disney+ or Netflix? Hacker! Ever lie on a dating app profile? Hacker! Ever stumble across a bug in a program and want to notify the software publisher of their mistake? Hacker! This ruling could have huge implications and most importantly drag a law drafted in 1986 into the here and now.

The court’s decision could fundamentally change how millions use their computers and access online services.

Source: The Supreme Court will hear its first big CFAA case

Internet Router Backdoors Create Vulnerabilities For Walmart Customers

Internet Router Backdoors Create Vulnerabilities For Walmart Customers

When thinking about cybersecurity and backdoors, we usually think this is a technique employed to attack corporations or governments.  It has been revealed that Middle America was targeted through embedded vulnerabilities in mid-tier routers.

Walmart-exclusive Jetstream routers and Wavlink routers contain hidden backdoors. The routers are actively being exploited by Mirai malware

Source: Walmart-exclusive router and others sold on Amazon & eBay contain hidden backdoors to control devices | CyberNews

Be The Change You Want to Eat?

Be The Change You Want to Eat?

After over 920 years, Oxford University has been prompted to make a bold step forward in making menu changes that will not only benefit the environment (assuming more institutions follow suit) but also help their students lean towards a healthier diet. No word on the fate of the “traditional English breakfast” – yet.

BURGERS and lamb chops may soon be off the menu after Oxford students voted to ban meat from the university.

Source: Students vote to ban meat from university

The Future of Agriculture is Now!

The Future of Agriculture is Now!

In as much as hydroponic farming was an agriculture curiosity in the 1980’s (and quickly relegated to growing “Hydro Weed”) that technology coupled with some clever algorithms and space planning has given rise to crop yields that would make Thomas Malthus himself throw up his hands in frustration.

95% less water. 99% less land. 400X more yield.

Source: This 2-Acre Vertical Farm Out-Produces 720 Acre ‘Flat Farms’

Do You Recognize any of These Passwords? I Hope Not!

Do You Recognize any of These Passwords? I Hope Not!

This annual review shows just how some folks just don’t understand that short and easy to remember passwords are just as easy and short for hackers to figure out! Don’t get lazy when deciding on a password.

 

Do you use strong, unique passwords? Check our annual top 200 worst passwords of 2020 and learn how to strengthen them now.

Source: Most common passwords of 2020