• img May 23, 2018

James Comey: FBI Faces Deep Tech-Related Questions

Cloud migration and automated systems, data privacy and encryption all remain central issues for the FBI as it considers its mandate and role in the modern digital age.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/james-comey-fbi-faces-deep-tech-related-questions/

Read More
  • img May 23, 2018

Ahead of GDPR, Information Governance Comes into Its Own

A full 98 percent of US enterprises have embarked on information governance (IG) projects, dramatically up from just 10 percent last year.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/ahead-of-gdpr-information-governance-comes-into-its-own/

Read More
  • img May 23, 2018

VPNFilter Malware Infects 500k Routers Including Linksys, MikroTik, NETGEAR

Researchers warn of malware infecting 500,000 popular routers in a campaign mostly targeting the Ukraine, but also 54 other countries.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/vpnfilter-malware-infects-500k-routers-including-linksys-mikrotik-netgear/

Read More
  • img May 23, 2018

Researchers hack BMW cars, discover 14 vulnerabilities

Keen Security Lab researchers have discovered fourteen vulnerabilities affecting a variety of BMW car models. The flaws could be exploited to gain local and remote access to infotainment (a.k.a head unit), the Telematics Control Unit (TCU or TCB) and UDS communication, as well as to gain control of the vehicles’ CAN buses. About the vulnerabilities […]

Read More
  • img May 23, 2018

Whitepaper: Future-proofing your password policy

Users are accumulating more and more passwords, and many of the recent breaches are the direct result of their compromise. As hackers find new ways to exploit password-protected systems, widely accepted password policies, such as character complexity and periodic password expirations, must be scrutinized. With authorities such as NIST challenging the status quo, and an […]

Read More