Cyber Security has become a requirement

Not only to protect commerce financially, but also legally...

you are a target

everyone is a victim

demand is growing

it can not be met

figures show

astonishing trends

Right now businesses are being pressured more and more to invest in additional security services in the attempt to keep up with evolving dangers. The consequences of not being prepared are/will be catastrophic for companies and their customers. In the process of deciding how to establish and operate a business, many business owners of varying power and influence hardly take into consideration the guaranteed attack on their information technology investments. If leadership does not lead by example, department managers will be uneasy about delegating to subordinates the required implementation of common sense computing safeguards.


the world and almost all technology is connected

With so many people on the planet having access to technology. With so many governments and markets being co-dependent on each other; the negative consequences of computer systems having control over civilization is endangering not only personal identities or payment transactions, but also national infrastructure safety and environmental integrity.

A Human Rights concern

cyber criminals and spies preying on the innocent

Illegal actions against individuals and companies are not only carried out by criminal cells, but also state-sponsored agencies and their non-governmental contracted propagators. Legitimate business operations are being affected by such revelations; this means profits will continue to be hampered if economic activity isn't left alone by the misuse of information technology systems.

Recent Posts

May 18

GDPR Becoming a Bigger Problem for U.S. Firms

A very interesting issue related to GDPR that has emerged from the U.S.A. Very simply, American firms that adhere to GDPR, but do not apply at least the same level of consent to its domestic customers may be acting illegally. Read More...

May 17

All Major Mobile Provider Customers Exposed

LocationSmart, a U.S. based company that acts as an aggregator of real-time data about the precise location of mobile phone devices, has been leaking this information to anyone via a buggy component of its Web site. Read More...

May 16

MedEvolves Public FTP Server Exposes 200k

The researcher who reported the leak to observed that a number of clients had files on the FTP server, and in all cases but two, the files were password-protected. Read More...

May 15

Indian Cricket Board Exposes Players' Data

The IT security researchers at Kromtech Security Center discovered a trove of personal and sensitive data belonging to around 15,000 to 20,000 Indian applicants participating in cricket seasons 2015-2018. Read More...

May 14

Facebook Data Leak Exposes 3 Million Users

Data from millions of Facebook users who used a popular personality app, including their answers to intimate questionnaires, was left exposed online for anyone to access, a New Scientist investigation has found. Read More...


Securing Wireless Neuro-stimulators

Keywords: Proprietary wireless communication protocol, black-box reverse engineering, low-cost randomness source, security architecture.

The newest generations of neurostimulators often include wireless capabilities that enable remote monitoring and reprogramming through an external device programmer. While the wireless interface enables more flexible and personalized treatments for patients, it also opens the door for adversaries to conduct software radio-based attacks. If strong security mechanisms are not in place, adversaries could send malicious commands to the neuro-stimulator in order to deliver undesired electrical signals to the patient's brain. Implantable medical devices (IMDs) typically rely on proprietary protocols to wirelessly communicate with external device programmers. In this paper, we fully reverse engineer the proprietary protocol between a device programmer and a widely used commercial neurostimulator from one of the leading IMD manufacturers.

By: Eduard Marin, Dave Singelée, Bohan Yang, Vladimir Volski, Guy A. E. Vandenbosch, Bart Nuttin, and Bart Preneel, — COSIC, KU Leuven, Belgium