Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Security

Ransomware Fog Rolls over SanFran Muni, SFMTA

November 28, 2016

We’ve known ransomware costs for a small- to medium-sized business can be $99,000, per Kapersky Labs. This includes lost business data, productivity and perhaps trade secrets or proprietary information, as well as increased spending on IT security.

A new Vanson Bourne survey, sponsored by SentinelOne of 500 cybersecurity decision makers reveals that recovery from a ransomware infection takes 33 employee hours. Suffering this potential consequence were the 48% of organizations that reported being subjected to at least one ransomware attack during the last 12 months.

Is Yahoo the Preferred E-Mail of Terrorists?

October 4, 2016

Some weird news is coming out about Yahoo! secretly providing the FBI and NSA with information about users who utilize certain phrases in their emails. This would make a lot of sense from a security standpoint but obviously destroys everyone's privacy as innocent civilians become targets of snooping. This is the case because you need to scan all emails to find the ones which match your criteria.

The news is weird because it doesn't make sense to just have one email provider scan their communications - naturally Microsoft and Google as well as others would have to do the same.

Cybersecurity and the Terrible, Horrible, No Good, Very Bad Week

September 25, 2016

There are perhaps four major cybersecurity incidents in my mind which are world-changing. The first is the OPM data breach which allowed China to get the most intimate secrets of virtually all federal employees – tens of millions of them. As I’ve described – this information, which is super top-secret and consists of sexual history could be used to blackmail U.S. workers.

President Obama, After $400 Million, Where are Those Criminal Iranian Hackers ?

August 5, 2016

Why did we ship a fortune to our mortal enemy and not get the indicted cybercriminals living in Iran who attacked us, in return?

The U.S. is in a cyberwar. It's common knowledge.

The New Threat: Drones Attacking Industrial Systems

August 5, 2016

We’ve discussed how recreational drones can be used as murder weapons in the past but drones can also be used in ways which businesses and governments should find quite disturbing. At the Black Hat conference in Las Vegas, Yokogawa Senior Principal Tech Specialist Jeff Melrose explained there are numerous drone-related problems to be concerned about:

  1. They can be used to block sensors in factories such as those monitoring temperature.
  2. They can block radio signals using a jammer or similar device making a factory and IoT devices unable to communicate or perhaps communicate erratically.
  3. They can be used to trail a vehicle at up to 25 MPH.
  4. They can infiltrate computer networks – attacking WiFi as well as bluetooth mice and keyboards to get into a network.

 

In addition, the Marines have a drone which can best be described as a mini-tank, capable of firing guns and launching grenades. It comes in two sizes – the large one can potentially fire 3,000 rounds per minute!

The Opportunities of the Dark Web

May 13, 2016

What I learned from the first-ever dark web event.



Yesterday, we held the world’s first Dark Web conference called Inside Dark Web – with partners Bob Miko and Alan Meckler. When we first decided to launch the event we discussed the business opportunities the dark web presents. After the event, there are a few observations I’ve made that I think are worth sharing.

Inside Dark Web Live Blog 2016

May 11, 2016





I will be live-blogging all about the latest dark web happenings from the show starting tomorrow. Gordon G. Chang, the author of Nuclear Showdown: North Korea Takes On the World as well as other works is about to take the stage here at the Inside Dark Web Conference.




The most dangerous criminals on the Dark Web are states. Hackers sponsored by Russia attacked Ukraine in the past. It is also a matter of time before a rogue state or bad actor takes out critical infrastructure in the US.




A Million Dark Web Facebook Users Value Privacy, Security and Safety

April 25, 2016

Each month, over one million people access Facebook over the dark web via Tor. So why does Facebook offer such a site and why would people even want to use it? The company says the primary drivers of this growth are privacy, security and safety.

According to Alec Muffet of Facebook:

This is why in the last two years we built the Facebook onion site and onion-mobile site, helped standardise the “.onion” domain name, and implemented Tor connectivity for our Android mobile app by enabling connections through Orbot.

He continued:

Over this period the number of people who access Facebook over Tor has increased.

Sonus Says Dial Plans Are A hot Product These Days

March 13, 2016

I just had a fascinating conversation with Sonus – they company responsible in-part for getting carriers to adopt IP communications is now seeing something very interesting happen. The company’s PSX or Centralized Routing and Policy Server is gaining interest among customers. The reason? They are looking to integrate their disparate IP communications systems together into a unified solution.

Inside Dark Web Conference: Why TMC Teamed with Alan Meckler

March 9, 2016

 

Alan Meckler is one of the brightest visionaries in the tech world having launched the first show covering the Internet in the 1990s – Internet World, part of Mecklermedia. He was underestimated and denigrated by virtually all the traditional tech publishers and trade show producers at the time, yet his event grew faster than any show I have ever seen.

I attended many of these conferences in New York and Los Angeles and saw with my own eyes how professionally run and vibrant these fast-growing shows were.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 66 Next
Featured Events