Wednesday, August 9, 2017

Maybe Americans don’t need fast home Internet service, FCC suggests

Maybe Americans don’t need fast home Internet service, FCC suggests | Ars Technica: "Americans might not need a fast home Internet connection, the Federal Communications Commission suggests in a new document."



'via Blog this'

BlackHat 2017: Multi-Stage Attack Targeting Container Developers, Presented by Aqua

BlackHat 2017: Multi-Stage Attack Targeting Container Developers, Presented by Aqua: "An attack on a container developer has two angles: one is obvious, the other less so. The obvious one is the developer’s level of access to enterprise resources. "



'via Blog this'

Tuesday, August 8, 2017

Arms Control and Disarmament - U.S. History in Context

"The various arrangements, which reduced, limited, and regulated armaments, provided more stable international environment; but could not themselves resolve other threatening, contentious issues. Controlling armaments had to be coupled with diplomatic resolve so that in an atmosphere temporarily cleared of insecurities inspired by unregulated weaponry, statesmen might deal with critical political, social, and economic differences."

http://ic.galegroup.com/ic/uhic/ReferenceDetailsPage/ReferenceDetailsWindow

Monday, August 7, 2017

Russian hackers arrested on vacation in US-led operation | Fox News

Man Who Hacked his Former Employer Gets 18-Month ...

Man Who Hacked his Former Employer Gets 18-Month ...: "A federal court sentenced a Tennessee man to an 18-month prison sentence and ordered him to pay $172,394 in restitution, following his breach into a former employer's network and copying of emails in order to give his new company a competitive edge, according to the US Department of Justice."



'via Blog this'

Russian admits being Ebury botnet herder, now jailed for 46 months • The Register

Russian admits being Ebury botnet herder, now jailed for 46 months • The Register: "A Russian man has been imprisoned for 46 months after admitting to using the Ebury malware to create a massive botnet for fun and profit."



'via Blog this'

Bitcoin values in recent years

Bitcoin Kurs: "After a couple years the value of Bitcoin increased as bitcoins traded for about $0.30 on January 1, 2011, went to $31.50 about six months later and ended the year at $4.25. 2012 proved to be a less volatile year with the Bitcoin price staying under $15.



 2013 - The Insane Bitcoin Price | Bitcoin's Value Increases

But 2013 is a year to remember in Bitcoin since the Bitcoin value increased with use cases and innovation. The Bitcoin price started January around $13.25, hit $266 in April, crashed to $50 a week later, consolidated for about six months and then after the United States Senate hearings on Bitcoin launched to the moon and briefly reached $1,240 before ending the year at around $800."



'via Blog this'

No, the U.S. Government Should Not Disclose All Vulnerabilities in Its Possession - Lawfare

No, the U.S. Government Should Not Disclose All Vulnerabilities in Its Possession - Lawfare. NSA view...


https://www.lawfareblog.com/no-us-government-should-not-disclose-all-vulnerabilities-its-possession

Thursday, August 3, 2017

Have I been pwned? Pwned Passwords

Have I been pwned? Pwned Passwords: The entire set of passwords is downloadable for free below with each password being represented as a SHA1 hash to protect the original value (some passwords contain personally identifiable information).

Tuesday, August 1, 2017

Russia’s hack against Yahoo show need for regulating cyberattacks - San Francisco Chronicle

Events seem to have come full circle for Kaljurand, who's now chairing the Global Commission on the Stability of Cyberspace. The organization wants to establish guidelines on what's permissible or out of bounds when it comes to hacking computer systems in another country.

http://www.sfchronicle.com/business/article/Russia-s-hack-against-Yahoo-show-need-for-11005014.php

How a coffee machine brewed up ransomware, and other startling findings in the HIMSS cybersecurity report | Healthcare IT News

Coffee machines connected to an internal control room network instead of an isolated network were infected in a factory cyberattack. 

http://www.healthcareitnews.com/news/how-coffee-machine-brewed-ransomware-and-other-startling-findings-himss-cybersecurity-report

Sunday, July 30, 2017

Nuance Restores 75% of Clients After NotPetya Malware Attack

Nuance Restores 75% of Clients After NotPetya Malware Attack: Nuance Communications, Inc.�stated that it has restored 75 percent of its clients following the NotPetya malware attack it experienced last month.

Nuance Healthcare, which offers a transcription platform used by medical professionals, said its flagship eScription LH platform has almost been returned to all customers.

Tuesday, July 25, 2017

Saturday, July 22, 2017

IoTBDS 2018 : 3rd International Conference on Internet of Things, Big Data and Security

IoTBDS 2018 : 3rd International Conference on Internet of Things, Big Data and Security: 3rd International Conference on Internet of Things, Big Data and Security IoTBDS

website: http://iotbds.org/

March 19 - 21, 2018 Funchal, Madeira, Portugal

eCrime 2018 : 13th Symposium on Electronic Crime Research

eCrime 2018 : 13th Symposium on Electronic Crime Research: May 14th - 16th 2018 in San Diego, CA.

Tuesday, July 18, 2017

Bridging the Gap Between Students and Security: 7 Steps to Creating a Successful Cybersecurity Campaign | EDUCAUSE

Bridging the Gap Between Students and Security: 7 Steps to Creating a Successful Cybersecurity Campaign | EDUCAUSE: For six years, we've created awareness campaigns featuring online cybersecurity games that entice more than 10,000 campus members to participate. This number continues to grow each year.

More than 120 nations adopt first-ever treaty to ban nuclear weapons at UN - France 24

More than 120 nations adopt first-ever treaty to ban nuclear weapons at UN - France 24: The treaty was adopted by a vote of 122 in favor with one country -- NATO member The Netherlands -- voting against, while Singapore abstained.

Special events aren't so special for Sixth Avenue residents | San Diego Reader

Special events aren't so special for Sixth Avenue residents | San Diego Reader - process notes.


https://m.sandiegoreader.com/news/2017/jul/17/stringers-events-arent-special-sixth-avenue-resid/?templates=mobile&google_editors_picks=true

Sunday, July 9, 2017

Robert Schroder - Ambient Music Guide

Robert Schroder - Ambient Music Guide: "Robert Schroder is one of Krautrock's forgotten heroes, "



'via Blog this'

Saturday, July 8, 2017

Bitcoin is Now Larger Than Most Fiat Currencies in Europe & Americas in Market Cap

Bitcoin is Now Larger Than Most Fiat Currencies in Europe & Americas in Market Cap

https://www.cryptocoinsnews.com/bitcoin-now-larger-fiat-currencies-europe-americas-market-cap/

Why The Cloud And Internet Of Things Don't Always Mix

Why The Cloud And Internet Of Things Don't Always Mix: "Margaret Martonosi, professor at Princeton University, suggests that processing data closer to or within sensors and devices -- and not sending it out to the cloud -- may accomplish more, in a more secure way, and more economically. "There are ways we could do better at designing edge devices to do more computation locally an send less data to the cloud,""



'via Blog this'

Tweet from Tea Pain (@TeaPainUSA)

Tea Pain (@TeaPainUSA) tweeted at 4:18 PM on Fri, Jul 07, 2017:
The next Russian attack on our election will be public and "legal", courtesy of the Trump administration.

https://t.co/E1qrwH0PuR
(https://twitter.com/TeaPainUSA/status/883465291241590784?s=03)

Get the official Twitter app at https://twitter.com/download?s=13

Thursday, July 6, 2017

Russians Are Said to Be Suspects in Hacks Involving Nuclear Site - Bloomberg

Trump budget seeks $3B for Homeland Security cyber unit | TheHill

Trump budget seeks $3B for Homeland Security cyber unit | TheHill: "President Trump’s budget request seeks increases in cybersecurity personnel across several departments and over $3 billion in funding for a Department of Homeland Security (DHS) unit in charge of safeguarding the country’s cyber infrastructure."



'via Blog this'

Wednesday, July 5, 2017

The Silk Road Is Dead, But the Internet's Illicit Drug Economy Is Alive and Well

The Silk Road Is Dead, But the Internet's Illicit Drug Economy Is Alive and Well - Hit & Run : Reason.com

http://reason.com/blog/2017/06/22/the-silk-road-is-dead-but-the-internets

Cruz's ObamaCare fix gets support from Hill conservatives | Fox News

Cruz's ObamaCare fix gets support from Hill conservatives | Fox News: "“The mandates the federal government puts on [Americans] are so ridiculous that men are forced to carry coverage for mammograms, women are forced to carry coverage for prostate issues. It’s absurd,” Marc Short, Trump's director of legislative affairs, told “Fox News Sunday.” “We’re going to get rid of many of those regulations and mandates to lower cost.”"



'via Blog this'

A Primer on DarkNet Marketplaces — FBI

A Primer on DarkNet Marketplaces — FBI: "But what are these underground marketplaces, and what exactly is the DarkNet? To understand both, you first have to have a basic understanding of the entire Internet."



'via Blog this'

A Primer on DarkNet Marketplaces — FBI

Tuesday, July 4, 2017

Monday, July 3, 2017

Dark web drugs

'Smishing' scams target your text messages. Here's how to avoid them | khou.com

What is genetic discrimination? - Genetics Home Reference

Genetic Discrimination and Other Laws - National Human Genome Research Institute (NHGRI)

Add to reference list.

Sunday, July 2, 2017

This is why your rent will keep going up in San Diego - The San Diego Union-Tribune

This is why your rent will keep going up in San Diego - The San Diego Union-Tribune: San Diego County stood out from much of the nation in having the second-worst housing. It has 58 percent of housing that is considered one or two stars (out of five) because of inferior construction, the study said. Los Angeles was the worst, 61 percent, and Austin had the best, 17 percent.

Thursday, June 29, 2017

Page Not Found - Lenovo Support

Page Not Found - Lenovo Support: "The document you have requested is not available. You may have entered an incorrect URL or login with authorized credentials (for Lenovo Field Servicers and/or Call Center Agents only) to view the page."



'via Blog this'

Tuesday, June 27, 2017

Why Mechanical Turk is the greatest market research tool you never thought to use

"One tricky thing about mTurk is setting up the HITs themselves. You need to know a little HTML code. But I'll include the very basic version I use:

<h3>Please follow the link for the survey</h3>"


https://medium.com/@vacord/why-mechanical-turk-is-the-greatest-market-research-tool-you-never-thought-to-use-872120766ee

Towards a Cyber-Security Treaty | Just Security

"Policymakers must therefore first acknowledge existing legal frameworks that transcend the orthodox focus on the law of war. These likely provide a much better starting point. Last year's Report of the U.N. Group of Governmental Experts, for example, has come up with cyber-specific rules of responsible behavior in cyberspace. In addition, Russia, China and four other States have signed an additional non-binding "international code of conduct for information security", in which they pledged "not to use information… to interfere in the affairs of other States or with the aim of undermining the political, economic, and social stability.""

https://www.justsecurity.org/32268/cyber-security-treaty/

PSA: Petya Ransomware Affecting Critical Systems Globally: Here's What to Do.

Sunday, June 25, 2017

Survey Shows US CIOs Getting A GDPR Headache - InformationWeek

Survey Shows US CIOs Getting A GDPR Headache - InformationWeek: US companies that don't have a presence in Europe still have to be sure that they comply with the EU's privacy laws regarding personally identifiable data.

Study finds cybersecurity pros are hiding breaches, bypassing protocols, and paying ransoms - TechRepublic

Study finds cybersecurity pros are hiding breaches, bypassing protocols, and paying ransoms - TechRepublic: It's a shocking discovery that could shake your concept of security to its core: Those trusted to protect your networks are ignoring their own policies. Is something rotten in the state of cybersec?

NSA officials worried about the day its potent hacking tool would get loose. Then it did. - The Washington Post

NSA officials worried about the day its potent hacking tool would get loose. Then it did. - The Washington Post: "“NSA identified a risk and communicated it to Microsoft, who put out an immediate patch” in March, said Mike McNerney, a former Pentagon cybersecurity official and a fellow at the Truman National Security Project. The problem, he said, is no senior official took the step of shouting to the world: “This one is very serious and we need to protect ourselves.”

But critics say the government got off easy this time. What if the Shadow Brokers had dumped the exploits in 2014, before the government had begun to upgrade software on its computers? What if they had released them and Microsoft had no ready patch?"



'via Blog this'

NSA officials worried about the day its potent hacking tool would get loose. Then it did. - The Washington Post

NSA officials worried about the day its potent hacking tool would get loose. Then it did. - The Washington Post: "“If one of our targets discovered we were using this particular exploit and turned it against the United States, the entire Department of Defense would be vulnerable,” the second employee said. “You just have to have a foothold inside the network and you can compromise everything.”"



'via Blog this'

EternalBlue has raised questions

The timing of EternalBlue has raised questions for experts because Microsoft made history by cancelling Patch Tuesday in February then released the fixes for the EternalBlue flaws in a March 2017 Patch Tuesday bulletin about one month before the Shadow Brokers unlocked the full details of the EternalBlue exploit.

Risk & Repeat: Microsoft slams NSA over EternalBlue

Risk & Repeat: Microsoft slams NSA over EternalBlue: "In the aftermath of the WannaCry ransomware attacks this month, Microsoft took the unprecedented step of publically calling out the National Security Agency for hoarding vulnerabilities and exploits, such as EternalBlue.

"



'via Blog this'

BBC video

Cycon | Call for Papers 2018

Thursday, June 22, 2017

Closing the Cybersecurity Skills Gap With a New Collar Approach

Bughunter University

Bughunter University: This site was created by the Google Security Team for members of our Vulnerability Reward Program bug hunter community. If you want to create great vulnerability reports, you've come to the right place! Take a look at various tips on how to be successful with our reward program, get a little behind-the-scenes knowledge, and learn from the mistakes other bug hunters sometimes make.

Program Rules – Application Security – Google

Program Rules – Application Security – Google We have long enjoyed a close relationship with the security research community. To honor all the cutting-edge external contributions that help us keep our users safe, we maintain a Vulnerability Reward Program for Google-owned web properties, running continuously since November 2010.

Patch Rewards – Application Security – Google

Patch Rewards – Application Security – Google Of course, you need to make sure that your work does not violate any law and does not disrupt or compromise any data that is not your own.

HHS targeting outdated regs in wake of damning cybersecurity report, WannaCry

HHS targeting outdated regs in wake of damning cybersecurity report, WannaCry | Healthcare IT News: new cybersecurity threats require updated guidelines, HHS, CMS, ASPR officials say.

Thursday, June 15, 2017

CIA has been hacking into Wi-Fi routers for years, leaked documents show | ZDNet

CIA has been hacking into Wi-Fi routers for years, leaked documents show 

http://www.zdnet.com/article/cia-has-been-hacking-into-wi-fi-routers-for-years-leaked-documents-show/

Advanced CIA firmware has been infecting Wi-Fi routers for years | Ars Technica

Advanced CIA firmware has been infecting Wi-Fi routers for years | Ars Technica

https://arstechnica.com/security/2017/06/advanced-cia-firmware-turns-home-routers-into-covert-listening-posts/

The NSA has linked the WannaCry computer worm to North Korea - The Washington Post

The NSA has linked the WannaCry computer worm to North Korea - The Washington Post: The assessment, which was issued internally last week and has not been made public, is based on an analysis of tactics, techniques and targets that point with “moderate confidence” to North Korea’s spy agency, the Reconnaissance General Bureau, according to an individual familiar with the report.

Microsoft: Latest security fixes thwart NSA hacking tools | ZDNet

Microsoft: Latest security fixes thwart NSA hacking tools | ZDNet: Microsoft has confirmed its latest round of security patches has fixed three remaining vulnerabilities built by the National Security Agency, which the company previously said it would not fix.

WannaCry ransomware timeline: from the NSA to the NHS

WannaCry ransomware timeline: from the NSA to the NHS | Gallery | Computerworld UK



Annoying format!

Why 'WannaCry' Malware Caused Chaos for National Health Service in U.K. - NBC News

Why 'WannaCry' Malware Caused Chaos for National Health Service in U.K. - NBC News: Last week's worldwide cyberattack potentially put lives at risk by paralyzing computers at state-run medical facilities across the U.K. — including many using discontinued Windows XP.

(U//FOUO) DHS Report: Potential Impacts of WannaCry Ransomware on Critical Infrastructure | Public Intelligence

(U//FOUO) DHS Report: Potential Impacts of WannaCry Ransomware on Critical Infrastructure | Public Intelligence: WannaCry installs the DoublePulsar backdoor, which means that infected machines may still be vulnerable to future attacks.

The Washington Post: The NSA has linked the WannaCry computer worm to North Korea

The NSA has linked the WannaCry computer worm to North Korea
http://wapo.st/2s2G1Gg

Wednesday, June 14, 2017

HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure | US-CERT

HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure | US-CERT: "DHS and FBI identified Internet Protocol (IP) addresses associated with a malware variant, known as DeltaCharlie, used to manage North Korea’s distributed denial-of-service (DDoS) botnet infrastructure. "



'via Blog this'

Director Comey Legally SS7 Taped Calls, Meetings With Trump – patribotics

Director Comey Legally Taped Calls, Meetings With Trump – patribotics

https://patribotics.blog/2017/06/13/exclusive-director-comey-legally-taped-calls-meetings-with-trump/

Friday, June 9, 2017

Digital disruption: Data intelligence, digital supply chain and beyond | IBM

IoT Security Spending Pays Off

OneLogin security chief reveals new details of data breach | ZDNet

"The company has advised customers to change their passwords, generate new API keys for their services, and create new OAuth tokens -- used for logging into accounts -- as well as to create new security certificates.

One report pointed to a corporate customer affected by the breach having to "rebuild the whole authentication security system.""

http://www.zdnet.com/article/onelogin-security-chief-new-details-data-breach/

Monday, June 5, 2017

Saturday, June 3, 2017

Shocke Bikes Spark Commuter eBike | ElectriCity Cycles

Indigenous knowledge systems can help solve the problems of climate change

"Indigenous knowledges have been greatly suppressed as a part of the colonial process in Australia. Our people lived completely sustainably, and in balance with each other and country, for over 60,000 years. We kept our country clean through practices like fire-stick farming, we monitored our species of animals and plants through our totem systems."

https://www.theguardian.com/commentisfree/2017/jun/02/indigenous-knowledge-systems-can-help-solve-the-problems-of-climate-change?CMP=share_btn_tw

QUIZ: How Good Are You At Detecting Bias? (with Lesson Plan) | The Lowdown | KQED News

QUIZ: How Good Are You At Detecting Bias? (with Lesson Plan) | The Lowdown | KQED News: Take this quiz to test how adept you are at recognizing five of the most common forms of cognitive bias that most likely influence your daily decision-making.

Friday, June 2, 2017

About Backchannel

About Backchannel: Mining the tech world for lively and meaningful tales and analysis. May be pitch?

Password manager OneLogin hacked, exposing sensitive customer data | ZDNet

Thursday, June 1, 2017

6 tips for successful enterprise risk management - The Business Journals

6 tips for successful enterprise risk management - The Business Journals: "A recent survey by the American Institute of CPAs (AICPA) and North Carolina State University, however, found that only 28 percent of companies have a complete ERM process in place. Additionally, less than half of companies have a partial ERM process in place, with some, but not all risks addressed. Those are pretty low numbers."



'via Blog this'

the life of a cybercriminal - Google Search

the life of a cybercriminal - Google Search

What to Do If the Laptop Ban Goes Global

Tuesday, May 30, 2017

Russian oligarch's £360m Sailing Yacht A leaves Monaco | Daily Mail Online

IBM SPSS Statistics

How to Offer Survey Incentives Without Sacrificing Good Data | SurveyMonkey Blog

Wally Rebounder Ping Pong Partner Table Tennis Trainer | Wally Rebounder Table Tennis Trainer

Wally Rebounder Ping Pong Partner Table Tennis Trainer | Wally Rebounder Table Tennis Trainer


http://www.wallyrebounder.com/

Cycon | Live Stream of CyCon 2017 Keynotes

Cycon | Live Stream of CyCon 2017 Keynotes: "The 9th International Conference on Cyber Conflict, CyCon 2017, brings key experts and decision-makers of the global cyber defence community to Tallinn from May 30th to June 2nd.

Selected Cycon 2017 Keynotes listed below are broadcast live on the news portal of Estonian national broadcaster ERR http://www.err.ee/598943/kaks-paeva-otseulekandeid-kuberjulgeoleku-konverentsilt

We invite you to share the link! "



'via Blog this'

You're not going to believe what I'm about to tell you - The Oatmeal

You're not going to believe what I'm about to tell you - The Oatmeal



Good source of stuff...

Thursday, May 25, 2017

Swapping DNA for Lower Insurance Costs Is One Wellness Step Too Far – Workforce Magazine

Swapping DNA for Lower Insurance Costs Is One Wellness Step Too Far – Workforce Magazine: The solution to cutting employers' health care spend is not asking employees to sacrifice their personal privacy in exchange for lower premiums, as is the push from HR 1313.

New Wellness Bill HR 1313 Gets Flak for Genetic Privacy Concerns – Workforce Magazine

New Wellness Bill HR 1313 Gets Flak for Genetic Privacy Concerns – Workforce Magazine: The Preserving Employee Wellness Programs Act has received criticism for potentially coercing employees to reveal personal genetic information to their employers.

Wednesday, May 24, 2017

Chemistry PR | Chemistry PR Team

Chemistry PR | Chemistry PR Team

http://chemistrypr.com/our-team/

Encryption: Vital to the Founding Fathers, Vital to Modern America | RealClearTechnology

Encryption: Vital to the Founding Fathers, Vital to Modern America | RealClearTechnology: "However, the issues at stake today are not fundamentally different from those present at America’s founding."



'via Blog this'

Encryption to come under renewed fire from European Commission in June

Encryption to come under renewed fire from European Commission in June: "Encryption will face a make it or break it moment in June when the European Commission lays out new options for forcing internet companies to hand over the keys."



'via Blog this'

At Crypto Hearing, Best Arguments Against Backdoor Mandates Come from Members of Congress Themselves

At Crypto Hearing, Best Arguments Against Backdoor Mandates Come from Members of Congress Themselves: "“I have three general concerns about Director Comey’s proposal. First, it’s impossible to build just a backdoor for just the good guys… j"



'via Blog this'

Encryption Workarounds by Orin S. Kerr, Bruce Schneier :: SSRN

Encryption Workarounds by Orin S. Kerr, Bruce Schneier :: SSRN: "The remainder of the essay develops lessons about encryption workarounds and the broader public debate about encryption in criminal investigations. "



'via Blog this'

Monday, May 22, 2017

My Blogger Buzz: How to Upload Files For Download in Blogger

My Blogger Buzz: How to Upload Files For Download in Blogger: "In this tutorial I am going to show you how to upload files to download in Blogger."

Thursday, May 18, 2017

WannaCrypt Hackers May Have A Hard Time Claiming That Ransom Without Getting Caught

WannaCrypt Hackers May Have A Hard Time Claiming That Ransom Without Getting Caught: Though bitcoin’s anonymity makes it popular, hackers may find it impossible to collect the $70,000 collected so far without leaving a trail behind them.

Chainalysis – Blockchain analysis

Chainalysis – Blockchain analysis: Train your analysts to be able to spot emerging threats from the deep web and investigate ransomware or extortion notes in-house.

New York's New Cybersecurity Regulations: The Good, The Bad And The Ugly - Security - United States

New York's New Cybersecurity Regulations: The Good, The Bad And The Ugly - Security - United States: The first foray into comprehensive state regulation of business data protection practices, and arguably the most stringent, is New York's Cybersecurity Requirements for Financial Services Companies, to be found at 23 NYCRR 500.

Study finds cybersecurity pros are hiding breaches, bypassing protocols, and paying ransoms - TechRepublic

Study finds cybersecurity pros are hiding breaches, bypassing protocols, and paying ransoms - TechRepublic

http://www.techrepublic.com/article/study-finds-cybersecurity-pros-are-hiding-breaches-bypassing-protocols-and-paying-ransoms/

Medical Devices Hit By Ransomware For The First Time In US Hospitals | Forbes Mobile

Adylkuzz hack, called larger than WannaCry, slows computers across the globe - CBS News

Wednesday, May 17, 2017

About - Cymmetria | Cyber deception

About - Cymmetria | Cyber deception: Cymmetria is a cyber deception startup focused on changing the asymmetry of cybersecurity, tilting the traditional security odds so that hackers are the ones who are left vulnerable.

Malware Case Is Major Blow for the N.S.A. - The New York Times

Sunday, May 14, 2017

Hackers use tools stolen from NSA in worldwide cyber attack

Hackers used cyberweapons stolen from the US National Security Agency to strike organisations across the globe on Friday, from the UK's National Health Service to European telecoms company Telefónica and FedEx of the US,

https://www.ft.com/content/e96924f0-3722-11e7-99bd-13beb0903fa3

Microsoft to spooks: WannaCrypt was inevitable, quit hoarding • The Register

Microsoft to spooks: WannaCrypt was inevitable, quit hoarding • The Register

https://www.theregister.co.uk/2017/05/14/microsoft_to_spooks_wannacrypt_was_inevitable_quit_hoarding/

Friday, May 12, 2017

Tuesday, May 9, 2017

Trump extends Obama executive order on cyberattacks | PCWorld

Trump extends Obama executive order on cyberattacks | PCWorld: Executive Order 13694 was introduced on April 1, 2015, and was due to expire on Saturday, but the president sent a letter to Congress on Wednesday evening informing it of his plans to keep it active.

Monday, May 8, 2017

Smart machines v hackers: How cyber warfare is escalating - BBC News

Wanna Know If Someone Planted Spyware on Your Computer? - Motherboard

Wanna Know If Someone Planted Spyware on Your Computer? - Motherboard: "Figuring out whether someone has installed malware on your computer can be tricky. Specifically, victims of domestic abuse and surveillance often don't know what sort of software has been used to monitor them."



'via Blog this'

Tuesday, May 2, 2017

Home Router Botnet Shut Down in Past 72 Hours. Who did it?

Home Router Botnet Shut Down in Past 72 Hours. Who did it?: "Yesterday morning we noticed that there was a rapid drop-off in attacks from the ISPs we identified 3 weeks ago, that had targeted WordPress websites."



'via Blog this'

Dan Geer: Cybersecurity, Humanity's Future "Conjoined" | Threatpost | The first stop for security news

Dan Geer: Cybersecurity, Humanity's Future "Conjoined" | Threatpost | The first stop for security news

https://threatpost.com/dan-geer-cybersecurity-humanitys-future-conjoined/125316/

Friday, April 28, 2017

Managing Insider Risk by Darrell Drystek - program, organization, employee on Peerlyst

Managing Insider Risk by Darrell Drystek - program, organization, employee on Peerlyst: "Insider risk is nothing 'new'. It has been an inherent risk in every form of organization, professional and personal relationship, throughout human history. "



'via Blog this'

Karmen Ransomware Variant Introduced by Russian Hacker

Karmen Ransomware Variant Introduced by Russian Hacker: "The Karmen malware derived from “Hidden Tear,” an open source ransomware project, available for purchase by anyone. As is typical for ransomware infections, Karmen encrypts files on the infected machine using the strong AES-256 encryption protocol, making them inaccessible to the user and may trigger a ransom note or instructions demanding that the user pay a large sum of money to obtain the decryption key from the attacker."

Senate Democrats hatch plan that could leave Donald Trump with little choice but to resign - Palmer Report

Senate Democrats hatch plan that could leave Donald Trump with little choice but to resign - Palmer Report

http://www.palmerreport.com/opinion/senate-democrats-hatch-plan-that-could-leave-donald-trump-with-little-choice-but-to-resign/2481/

After blitzing FlexiSpy, hackers declare war on all stalkerware makers: 'We're coming for you' • The Register

2012 Study finds 90 percent have no recent cybersecurity training

Study finds 90 percent have no recent cybersecurity training: "That 68/32 split you see in the pie chart rang a bell with us because it mirrored a different ESET poll, conducted by Harris earlier this year. The purpose of that poll was to study implications of the bring-your-own-device or BYOD trend. We asked employed U.S. adults if they had received any kind of computer security training from their employer and only 32 percent said they had. Another 64 percent said they had not and 4 percent said they couldn’t recall having such training, which probably means it was not worth remembering."



'via Blog this'

Wednesday, April 26, 2017