Let's Talk
Welcome to the EiQ Networks Blog

John Linkous

Recent Posts

Driving Security Accountability through DevSecOps

Posted by John Linkous on Apr 25, 2017

For those of you who have been reading the EiQ Networks blog on a regular basis, you know that one of the most fundamental and unyielding tenets of the security world that we frequently point out is this: functionality and performance always – and we mean always – trump security.  For developers of new software products, hardware technologies and the emerging world of IoT, the ability to get to market as quickly as possible is the most important thing a company can do, because it gets them a market position that turns into revenue.  Because security isn’t generally perceived by companies that make commercial software and hardware as something on which people make buying decisions, it’s usually relegated to a last-minute “bolt-on”, or simply addressed after vulnerabilities are discovered by users and security analysts after the product is released.  Even after disclosure of vulnerabilities, many companies either ignore these findings or back-burner patches and fixes until the next major release of their product.  One of the “dirty little secrets” of the industry is that certain, specific vendors (we won’t name names here… but they know who they are) have had gaping holes in their products for months and sometimes even years.  Sadly, this behavior among many companies is not likely to change.

Improving Your Online Privacy in Five Easy Steps

Posted by John Linkous on Apr 18, 2017

Most of us think about information security in terms of what hackers, malware, and other bad actors can do to compromise our systems and data.  And while that’s certainly a critical concern, we sometimes forget about another aspect of information security: protecting our privacy.  The privacy debate is one that has raged for many years.  Today it is often equated with government intrusion, and while this is certainly a legitimate macro-level concern, there are other sinister threats that can be realized when we lose our digital privacy; identity theft, cyberstalking and online bullying, and physical assault due to location disclosure from digital assets (think geolocation inside of devices and geotagging metadata within digital media) are all real-world risks if we don’t protect ourselves.  And while privacy and security are not the same thing, good security definitely improves privacy.

Breaking Down the Top Three Kinetic Hacks of All Time

Posted by John Linkous on Apr 11, 2017

Last Friday night, a cacophony of 156 public warning system sirens sounded in Dallas, Texas.  The sirens weren’t responding to a danger, such as tornados or other similar threats.  Instead, these sirens were hacked, sounding off maximum volume well into the early hours of Saturday morning.  This may see
m like a prank similar to something out of a modern-day “Animal House,” or a badly-scripted Hollywood treatment of hacking culture.  But the reality is that attacks on physical infrastructure represent a potential threat that pales the scope and effect of traditional hacks.

Five Ways to Stop DDoS In Its Tracks

Posted by John Linkous on Apr 4, 2017

Just a few weeks ago, security researcher and journalist Brian Krebs reported on the arrest of two men who were suspected of running “vDOS,” one of the most pervasive distributed denial-of-service (DDoS) paid service networks in the world.  DDoS as a subscription service is nothing new; vDOS was in existence for well over four years, and along with other services such as “PoodleStresser” were part of the nascent but rapidly-growing distributed denial of service-as-a-service market (“DDoSaaS” – how’s that for an acronym?)

Fear (Multi-)Factor

Posted by John Linkous on Mar 27, 2017

During the early-to-mid 2000’s, the NBC network aired a successful reality television show called “Fear Factor.”  In that show, contestants competed by attempting a broad range of terrifying stunts, eating grotesque foods, and a range of other activities designed to exploit their innate fears.  The contestants, one assumes, had weighed the value of the show’s prize against the risks of the unknown, and decided to participate in the hopes of gaining the $50,000 top prize.

Jumping the Air Gap

Posted by John Linkous on Mar 20, 2017

Security and privacy experts – not to mention federal government agencies - are still reeling from the disclosure by WikiLeaks of the CIA’s cachet of hacking and surveillance technologies that was released a few weeks ago.  Among those disclosures, however, was a particularly interesting finding: the existence of “HammerDrill 2.0,” a cross-platform security toolkit that can breach the air gap.

IoT: The Internet of Threats?

Posted by John Linkous on Mar 13, 2017

The past week has provided some interesting revelations around the Internet of Things (IoT).  As we all know, the IoT is that collection of generally unmanaged devices with embedded connectivity to the Internet.  From cars, to refrigerators, thermostats, televisions and more, the IoT seeks to connect everything it can to the world’s largest global network.  Conceptually, the IoT is a great thing: it can lead to more efficient use of energy, customized manufacturing, faster transportation and much more.  However, as we’ve seen in the past ten days, there’s a dark side to the IoT.

The Big Lockdown

Posted by John Linkous on Mar 7, 2017

Late last year, Symantec Corporation released a survey on ransomware: malicious software that attempts to encrypt everything it can access, and demands money (usually in difficult-to-trace remuneration such as Bitcoin).  One of the most disturbing trends of this report was that ransomware has grown from less than 20% of all new malware types in 2014, to over 90% of all newly discovered malware types today.  Why is this?  Well, put simply, because it works.  When an organization’s critical business data is directly compromised – with the promise of possibly regaining access and restoring business as usual – the temptation to simply pay $500-$1,000 in Bitcoin or gift cards is strong.  However, there’s always one nagging question in the background: what if the attacker doesn’t actually give us the key to decrypt the files?

A Tale of Two Security Vendors

Posted by John Linkous on Feb 28, 2017

Over the past two weeks, the security industry has seen some disclosures (or in one case, a half-disclosure) of vulnerabilities within their products.  In at least two of these cases, we know that these vulnerabilities could have led to a significant compromise of data and systems.  But what’s really interesting about these two vendors is how they responded to the discovery.

David and Goliath Redux

Posted by John Linkous on Feb 21, 2017

In the story of David and Goliath, an underdog managed to win a contest against a much larger, stronger foe.  Looking at the state of information security today, a David-and-Goliath scenario is very much present; except David is the small and midsize business (SMB) market, and Goliath is the marauding horde of attackers, malware and other bad actors trying to break their systems and steal their data.  And just like in the biblical tale, SMB organizations are dealing with an opponent who seems impossible to defeat.

Subscribe to Email Updates

How Prepared Are You to Battle Cyber Attacks?

Find out with EiQ's free cyber security readiness assessment!

Find Out Now!

Posts by Topic

See All