Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Security

President Obama, After $400 Million, Where are Those Criminal Iranian Hackers ?

August 5, 2016

Why did we ship a fortune to our mortal enemy and not get the indicted cybercriminals living in Iran who attacked us, in return?

The U.S. is in a cyberwar. It's common knowledge.

The New Threat: Drones Attacking Industrial Systems

August 5, 2016

We’ve discussed how recreational drones can be used as murder weapons in the past but drones can also be used in ways which businesses and governments should find quite disturbing. At the Black Hat conference in Las Vegas, Yokogawa Senior Principal Tech Specialist Jeff Melrose explained there are numerous drone-related problems to be concerned about:

  1. They can be used to block sensors in factories such as those monitoring temperature.
  2. They can block radio signals using a jammer or similar device making a factory and IoT devices unable to communicate or perhaps communicate erratically.
  3. They can be used to trail a vehicle at up to 25 MPH.
  4. They can infiltrate computer networks – attacking WiFi as well as bluetooth mice and keyboards to get into a network.

 

In addition, the Marines have a drone which can best be described as a mini-tank, capable of firing guns and launching grenades. It comes in two sizes – the large one can potentially fire 3,000 rounds per minute!

The Opportunities of the Dark Web

May 13, 2016

What I learned from the first-ever dark web event.



Yesterday, we held the world’s first Dark Web conference called Inside Dark Web – with partners Bob Miko and Alan Meckler. When we first decided to launch the event we discussed the business opportunities the dark web presents. After the event, there are a few observations I’ve made that I think are worth sharing.

Inside Dark Web Live Blog 2016

May 11, 2016





I will be live-blogging all about the latest dark web happenings from the show starting tomorrow. Gordon G. Chang, the author of Nuclear Showdown: North Korea Takes On the World as well as other works is about to take the stage here at the Inside Dark Web Conference.




The most dangerous criminals on the Dark Web are states. Hackers sponsored by Russia attacked Ukraine in the past. It is also a matter of time before a rogue state or bad actor takes out critical infrastructure in the US.




A Million Dark Web Facebook Users Value Privacy, Security and Safety

April 25, 2016

Each month, over one million people access Facebook over the dark web via Tor. So why does Facebook offer such a site and why would people even want to use it? The company says the primary drivers of this growth are privacy, security and safety.

According to Alec Muffet of Facebook:

This is why in the last two years we built the Facebook onion site and onion-mobile site, helped standardise the “.onion” domain name, and implemented Tor connectivity for our Android mobile app by enabling connections through Orbot.

He continued:

Over this period the number of people who access Facebook over Tor has increased.

Sonus Says Dial Plans Are A hot Product These Days

March 13, 2016

I just had a fascinating conversation with Sonus – they company responsible in-part for getting carriers to adopt IP communications is now seeing something very interesting happen. The company’s PSX or Centralized Routing and Policy Server is gaining interest among customers. The reason? They are looking to integrate their disparate IP communications systems together into a unified solution.

Inside Dark Web Conference: Why TMC Teamed with Alan Meckler

March 9, 2016

 

Alan Meckler is one of the brightest visionaries in the tech world having launched the first show covering the Internet in the 1990s – Internet World, part of Mecklermedia. He was underestimated and denigrated by virtually all the traditional tech publishers and trade show producers at the time, yet his event grew faster than any show I have ever seen.

I attended many of these conferences in New York and Los Angeles and saw with my own eyes how professionally run and vibrant these fast-growing shows were.

State of the IoT Market: Kore, Polaris, Cradlepoint

February 10, 2016

Cradlepoint talks scaling IoT at IoT Evolution Expo




At the most recent IoT Evolution Expo in Fort Lauderdale, Florida, we had a chance to interview a number of the companies shaping the future of the IoT space. Cradlepoint (below) for example had a lot of exciting news to share such as the company's recent SDN acquisition and how this relates to keeping IoT devices secure and scaling properly.



Gemalto too had some great news to share - their secure IoT solutions are doing well in the market thanks to mainstream hacking publicity. He went on to detail various threats companies need to keep in mind - after a risk assessment they work backwards from.



If there was a trend, it was optimism... Here is the complete list of IoT companies interviewed:

Azul Systems Clear2there Cradlepoint Droplit Encore Networks Exosite Gemalto Inmarsat Intertek Kore LocusTraxx My Devices Polaris Scriptr.io SECO Webee
















Politically Motivated Hackers Hit Nissan, Are You Prepared?

January 15, 2016

Quite often when we think about hackers, we imagine there is someone looking to gain something of value from us. In response, we plan our computer and network security strategy with this in mind. For example, many attacks have targeted credit cards as companies like Target have learned about the hard way. Their breach cost them hundreds of millions - $200 million actually and counting.

My Thoughts on the Iran Dam Hacking in Rye, NY

December 21, 2015

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 65 Next
Featured Events