-
Archives
- August 2020
- November 2019
- February 2018
- January 2017
- December 2016
- November 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- March 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- January 2010
-
Meta
Author Archives: conrad
CV19 SelfDefense Mobile Phone App now available for download
To open college campuses safely amidst the COVID-19 pandemic, we recommend the CV19 SelfDefense Android Mobile Phone App. This research project was funded by Florida State University (CC-045704, 5/11/20 – 8/18/20). The first iteration just became available. You can download … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on CV19 SelfDefense Mobile Phone App now available for download
Women are pretending to be men on Instagram to circumvent algorithmic blocking
Gender deception is widespread in social media. Instagram has been hiding photos and videos that it considers to be vaguely “inappropriate” without explaining what specific kind of content that includes or alerting affected users. Such posts are algorithmically blocked from … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Women are pretending to be men on Instagram to circumvent algorithmic blocking
Hackers New Tactic: Locking All the Doors at an Expensive Hotel
The ransom demand arrived one recent morning by email, after about a dozen guests were locked out of their rooms at the lakeside Alpine hotel in Austria. The electronic key system at the picturesque Romantik Seehotel Jaegerwirt had been infiltrated, … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Hackers New Tactic: Locking All the Doors at an Expensive Hotel
DARPA’s Master Plan to Spot Facebook Terrorists?
There are plenty of lunatics on Facebook, Twitter and other social media. Not to mention trolls, haters and other assorted unpleasantness. Most are harmless. A few are terrorists and insurgents who would love nothing better than to kill U.S. troops. … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on DARPA’s Master Plan to Spot Facebook Terrorists?
5 Ways The Cyber-Threat Landscape Shifted In 2016
Change is the one constant in the threat landscape, and cyber events of 2016 served as a reminder of that aphorism in multiple and often painful ways. Whether it was stealing tens of millions of dollars from financial institutions, locking … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on 5 Ways The Cyber-Threat Landscape Shifted In 2016
With shifts in national mood come shifts in the words we use…
In the wake of the election (and our Thanksgiving dinner), it’s clear that American society has been fractured. Negative emotions are running amok, and countless words of anger and frustration have been spilled. If you were to analyze any news … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on With shifts in national mood come shifts in the words we use…
Is it impossible to stop deceptive news?
Facebook’s Mark Zuckerberg on Friday night posted a message on his Facebook page about so-called fake news and the controversy over his company’s role in carrying it to hundreds of millions of users. “The bottom line is: We take misinformation … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Is it impossible to stop deceptive news?
Facebook Considering Ways to Combat Fake News
After more than a week of accusations that the spread of fake news on Facebook may have affected the outcome of the presidential election, Mark Zuckerberg published a detailed post Friday night describing ways the company is considering dealing with … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Facebook Considering Ways to Combat Fake News
NSA Missed ‘Big Red Flags’ in Leak Suspect’s Behavior
Year after year, both in his messy personal life and his brazen theft of classified documents from the National Security Agency, Harold T. Martin III put to the test the government’s costly system for protecting secrets. And year after year, … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on NSA Missed ‘Big Red Flags’ in Leak Suspect’s Behavior
The Biggest Cybersecurity Threats Are Insiders
The role that insiders play in the vulnerability of all sizes of corporations is massive and growing. In the 2016 Cyber Security Intelligence Index, IBM found that 60% of all attacks were carried out by insiders. Of these attacks, three-quarters … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on The Biggest Cybersecurity Threats Are Insiders