Monday, August 28, 2017

New Report Highlights Gaps in Preparedness for Cybersecurity Risks to Critical Infrastructure, Calls for “Bold, Decisive Actions” | Publications | Morrison Foerster

New Report Highlights Gaps in Preparedness for Cybersecurity Risks to Critical Infrastructure, Calls for “Bold, Decisive Actions” | Publications | Morrison Foerster: The public and private sectors could together offer “tremendous cyber capabilities and resources,” the report states, but realization of that potential has fallen short in the face of a growing threat, creating “a narrow and fleeting window of opportunity before a watershed, 9/11-level cyberattack.”

China Plans To Create Cybersecurity Schools | PYMNTS.com

China Plans To Create Cybersecurity Schools | PYMNTS.com: China has announced news of its plan to build approximately four to six top-notch cybersecurity schools between 2017 and 2027 to do battle against hackers and cybercrime.

Our fear of killer robots might doom us all

Our fear of killer robots might doom us all: Only true for people to whom autonomous cars are a coll idea and not a nightmare on four wheels: "The problem is you probably won't have autonomous cars and 1,000 other cool inventions, too. Fear of new technology can be stultifying."

windows master image hacking defcon 22 - Google Search

Digital Journal: A Global Digital Media Network

Digital Journal: A Global Digital Media Network

http://m.digitaljournal.com/pr/3459764

Saturday, August 26, 2017

US Transparency Regarding International Law in Cyberspace | Just Security

"The 2013 Tallinn Manual dealt with conflict law and cyber warfare, while Tallinn 2.0, due out in next January, analyses how peacetime legal regimes apply to activities in cyberspace."

https://www.justsecurity.org/34465/transparency-international-law-cyberspace/

How do I interpret data in SPSS for Pearson's r and scatterplots?

How do I interpret data in SPSS for Pearson's r and scatterplots?: "When Pearson’s r is close to 1…
 
This means that there is a strong relationship between your two variables. This means that changes in one variable are strongly correlated with changes in the second variable."



'via Blog this'

IT professionals need more security training for DevOps

IT professionals need more security training for DevOps: "Despite the fact that nearly 80 percent of those who responded to the survey hold either a bachelor or master's degree in computer science, there is still an overwhelming lack of cybersecurity knowledge prior to entering the workforce.A large majority of those surveyed (70 percent) said that the security education they received did not fully prepare them for what their positions require."

Interpretation Catalysts in Cyberspace by Rebecca Ingber :: SSRN

Grey-Areas-in-the-International-Law-of-Cyberspace

Elon Musk and AI leaders call for a ban on killer robots | The Verge

Wednesday, August 23, 2017

Cyber security training

Cyber security training: "“A solid baseline of security-awareness training for employees is a good start and need not be expensive”

Stephen Cobb, digital security expert"



'via Blog this'

Tuesday, August 22, 2017

Great big list of cybersecurity resources | CSO Online

Great big list of cybersecurity resources | CSO Online: Here's an excuse for IT workers to take some extra time off and head to the beach. Bring a smartphone or tablet, and check out these cybersecurity lists. They're an easy read—chock-full of insightful cybersecurity facts, figures, statistics and more.

The U.S. Spy Hub in the Heart of Australia

The U.S. Spy Hub in the Heart of Australia: “Pine Gap literally hardwires us into the activities of the American military and in some cases, that means we will cop the consequences, like it or not,” said Tanter, the University of Melbourne professor. “Pine Gap will be contributing hugely in real-time to those operations, as well as in preparation for them. So whether or not the Australian government thinks that an attack on North Korea is either justified, or a wise and sensible move, we will be part of that,” Tanter added. “We’ll be culpable in the terms of the consequences.”

Did a Mole-Who-Must-Not-Be-Named Leak Plot to Elect Trump?

Did a Mole-Who-Must-Not-Be-Named Leak Plot to Elect Trump?: “We assess Russian President Vladimir Putin ordered an influence campaign in 2016 aimed at the U.S. presidential election. Russia’s goals were to undermine public faith in the U.S. democratic process, denigrate Secretary [Hillary] Clinton, and harm her electability and potential presidency. We further assess Putin and the Russian Government developed a clear preference for President-elect Trump. We have high confidence in these judgments ... Moscow’s influence campaign followed a Russian messaging strategy that blends covert intelligence operations—such as cyber activity—with overt efforts by Russian Government agencies, state-funded media, third-party intermediaries, and paid social media users or ‘trolls.’...”

Tuesday, August 8, 2017

Arms Control and Disarmament - U.S. History in Context

"The various arrangements, which reduced, limited, and regulated armaments, provided more stable international environment; but could not themselves resolve other threatening, contentious issues. Controlling armaments had to be coupled with diplomatic resolve so that in an atmosphere temporarily cleared of insecurities inspired by unregulated weaponry, statesmen might deal with critical political, social, and economic differences."

http://ic.galegroup.com/ic/uhic/ReferenceDetailsPage/ReferenceDetailsWindow

Russian hackers arrested on vacation in US-led operation | Fox News

Monday, August 7, 2017

Man Who Hacked his Former Employer Gets 18-Month ...

Man Who Hacked his Former Employer Gets 18-Month ...: "A federal court sentenced a Tennessee man to an 18-month prison sentence and ordered him to pay $172,394 in restitution, following his breach into a former employer's network and copying of emails in order to give his new company a competitive edge, according to the US Department of Justice."



'via Blog this'

Russian admits being Ebury botnet herder, now jailed for 46 months • The Register

Russian admits being Ebury botnet herder, now jailed for 46 months • The Register: "A Russian man has been imprisoned for 46 months after admitting to using the Ebury malware to create a massive botnet for fun and profit."



'via Blog this'

Bitcoin values in recent years

Bitcoin Kurs: "After a couple years the value of Bitcoin increased as bitcoins traded for about $0.30 on January 1, 2011, went to $31.50 about six months later and ended the year at $4.25. 2012 proved to be a less volatile year with the Bitcoin price staying under $15.



 2013 - The Insane Bitcoin Price | Bitcoin's Value Increases

But 2013 is a year to remember in Bitcoin since the Bitcoin value increased with use cases and innovation. The Bitcoin price started January around $13.25, hit $266 in April, crashed to $50 a week later, consolidated for about six months and then after the United States Senate hearings on Bitcoin launched to the moon and briefly reached $1,240 before ending the year at around $800."



'via Blog this'

No, the U.S. Government Should Not Disclose All Vulnerabilities in Its Possession - Lawfare

No, the U.S. Government Should Not Disclose All Vulnerabilities in Its Possession - Lawfare. NSA view...


https://www.lawfareblog.com/no-us-government-should-not-disclose-all-vulnerabilities-its-possession

Thursday, August 3, 2017

Have I been pwned? Pwned Passwords

Have I been pwned? Pwned Passwords: The entire set of passwords is downloadable for free below with each password being represented as a SHA1 hash to protect the original value (some passwords contain personally identifiable information).

Wednesday, August 2, 2017

Russia’s hack against Yahoo show need for regulating cyberattacks - San Francisco Chronicle

Events seem to have come full circle for Kaljurand, who's now chairing the Global Commission on the Stability of Cyberspace. The organization wants to establish guidelines on what's permissible or out of bounds when it comes to hacking computer systems in another country.

http://www.sfchronicle.com/business/article/Russia-s-hack-against-Yahoo-show-need-for-11005014.php

How a coffee machine brewed up ransomware, and other startling findings in the HIMSS cybersecurity report | Healthcare IT News

Coffee machines connected to an internal control room network instead of an isolated network were infected in a factory cyberattack. 

http://www.healthcareitnews.com/news/how-coffee-machine-brewed-ransomware-and-other-startling-findings-himss-cybersecurity-report