Get In Touch
Connect Above

Become a subscriber and stay up to
date with my favorite topics.

Blog, News,
Media,
/ just for you.

    Posted by Daniel Lance
    06/14/2021

    Vendor Shaming and Informing Users

    Originally published in 2019 Link to article https://www.linkedin.com/pulse/vendor-shaming-informing-users-dale-peterson/

    Read More
    Posted by Daniel Lance
    06/14/2021

    Are CAN networks really unsafe?

    Originally published in 2017 Are CAN networks really unsafe? Well no, kinda....

    Read More
    Posted by Daniel Lance
    06/14/2021

    My Fellow Americans.

    Originally published Jul 4, 2020 At the time of publishing there was...

    Read More
    Posted by Daniel Lance
    06/14/2021

    Vendor Shaming and Informing Users

    Originally published in 2019 Link to article https://www.linkedin.com/pulse/vendor-shaming-informing-users-dale-peterson/

    Read More
    Posted by Daniel Lance
    06/14/2021

    LookBack Malware Targets More Than a Dozen Utilities

    Originally published in 2019 Link to article https://www.nozominetworks.com/blog/latest-on-lookback-more-than-a-dozen-utilities-targeted/        

    Read More
    Posted by Daniel Lance
    06/14/2021

    This critical industrial device is a target for hacking

    Originally published in 2019 Interview intro to PLC’s     https://archerint.com/this-critical-industrial-device-is-a-target-for-hacking/  ...

    Read More

    Contact

    Would you like to interview me for a story?

    News & blog.
    My Latest Work.

    Articles I have been quoted in, Speeches & Interviews.
    Views & Opinions are my own.

    • All
    • Conference
    • Cyber Security
    • Government
    • News Articles
    • Research

    My Fellow Americans.

    Originally published Jul 4, 2020 At the time of publishing there was…

    Vendor Shaming and Informing Users

    Originally published in 2019 Link to article https://www.linkedin.com/pulse/vendor-shaming-informing-users-dale-peterson/

    LookBack Malware Targets More Than a Dozen Utilities

    Originally published in 2019 Link to article https://www.nozominetworks.com/blog/latest-on-lookback-more-than-a-dozen-utilities-targeted/        

    This critical industrial device is a target for hacking

    Originally published in 2019 Interview intro to PLC’s     https://archerint.com/this-critical-industrial-device-is-a-target-for-hacking/  …

    Your food is getting easier to hack

    Originally published in 2017 My research talked about in this article.  

    Are CAN networks really unsafe?

    Originally published in 2017 Are CAN networks really unsafe? Well no, kinda….

    Velodyne LiDAR Telemetry Vulnerability

    Originally published in 2016 Velodyne LiDAR, Inc. HDL-64E, HDL-32E, and the PUCK…

    “In-security” camera? The battle over the claim of a malware connection on surveillance cams

    “In-security” camera? The battle over the claim of a malware connection on…

    What is a zero day?

      Originally published in 2016 “A zero-day (also known as zero-hour or…

    2015 Wireless Sensor Networks: Nothing is Out of Reach Slides

      Originally published in 2015 After years of installing wireless sensor networks…

    2016 Hawaii Security Sessions Presentation

      Originally published in 2016 WHAT “YOU’VE GOT MAIL” TAUGHT ME ABOUT…

    Eavesdropping on your Internet: Kazakhstan plan is rife with risk

    Eavesdropping on your Internet: Kazakhstan plan is rife with risk Originally published…

    Pirates–and shady crewmembers–may be able to hack a ship’s “black box”

    Pirates–and shady crewmembers–may be able to hack a ship’s “black box” Originally…

    ‘What crash?’ Your car may tattle on your (very) bad driving

    ‘What crash?’ Your car may tattle on your (very) bad driving Originally…

    Breach boycott: would you stop doing business with a company that’s been hacked?

    Breach boycott: would you stop doing business with a company that’s been…

    Seasons greetings from a Russian hack attack group

    Seasons greetings from a Russian hack attack group Originally published in 2015…

    Lust winning out over fear after Ashley Madison info attack

    Lust winning out over fear after Ashley Madison info attack Originally published…

    Top 5 security fiascos of 2015 & how they messed with your life

    Top 5 security fiascos of 2015 & how they messed with your…

    Researcher finds “easy button” for attacking motors

    Researcher finds “easy button” for attacking motors Originally published in 2016 Quote…

    Frustrated Android users hope Samsung lawsuit will bring change

    Frustrated Android users hope Samsung lawsuit will bring change Originally published in…

    Holding your doctor & your records hostage

    Holding your doctor & your records hostage Originally published in 2016 Quote…

    Hospital pays ransom to get computers back

    Hospital pays ransom to get computers back Originally published in 2016 Quote…

    New IRS tax hack rips off people who were already ripped off

    New IRS tax hack rips off people who were already ripped off…

    “Blood in the water” – Why there may be more ransomware attacks on Macs

    “Blood in the water” – Why there may be more ransomware attacks…

    The hole in your phone is getting bigger

    The hole in your phone is getting bigger Originally published in 2015…

    Archer to Host Live Interactive Post-Game Show at Security Event in Hawaii

    PORTLAND, Ore., Feb. 15, 2016 /PRNewswire/ -- Can't make it to the EnergySec cybersecurity event in Hawaii at the...

    Java case over—what it means for you & your computer

    Java case over—what it means for you & your computer Quote from...

    Collaboration

    Let’s talk.