Author Archives: conrad

CV19 SelfDefense Mobile Phone App now available for download

To open college campuses safely amidst the COVID-19 pandemic, we recommend the CV19 SelfDefense Android Mobile Phone App. This research project was funded by Florida State University (CC-045704, 5/11/20 – 8/18/20). The first iteration just became available. You can download … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on CV19 SelfDefense Mobile Phone App now available for download

Women are pretending to be men on Instagram to circumvent algorithmic blocking

Gender deception is widespread in social media. Instagram has been hiding photos and videos that it considers to be vaguely “inappropriate” without explaining what specific kind of content that includes or alerting affected users. Such posts are algorithmically blocked from … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Women are pretending to be men on Instagram to circumvent algorithmic blocking

Hackers New Tactic: Locking All the Doors at an Expensive Hotel

The ransom demand arrived one recent morning by email, after about a dozen guests were locked out of their rooms at the lakeside Alpine hotel in Austria. The electronic key system at the picturesque Romantik Seehotel Jaegerwirt had been infiltrated, … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Hackers New Tactic: Locking All the Doors at an Expensive Hotel

DARPA’s Master Plan to Spot Facebook Terrorists?

There are plenty of lunatics on Facebook, Twitter and other social media. Not to mention trolls, haters and other assorted unpleasantness. Most are harmless. A few are terrorists and insurgents who would love nothing better than to kill U.S. troops. … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on DARPA’s Master Plan to Spot Facebook Terrorists?

5 Ways The Cyber-Threat Landscape Shifted In 2016

Change is the one constant in the threat landscape, and cyber events of 2016 served as a reminder of that aphorism in multiple and often painful ways. Whether it was stealing tens of millions of dollars from financial institutions, locking … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on 5 Ways The Cyber-Threat Landscape Shifted In 2016

With shifts in national mood come shifts in the words we use…

In the wake of the election (and our Thanksgiving dinner), it’s clear that American society has been fractured. Negative emotions are running amok, and countless words of anger and frustration have been spilled. If you were to analyze any news … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on With shifts in national mood come shifts in the words we use…

Is it impossible to stop deceptive news?

Facebook’s Mark Zuckerberg on Friday night posted a message on his Facebook page about so-called fake news and the controversy over his company’s role in carrying it to hundreds of millions of users. “The bottom line is: We take misinformation … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Is it impossible to stop deceptive news?

Facebook Considering Ways to Combat Fake News

After more than a week of accusations that the spread of fake news on Facebook may have affected the outcome of the presidential election, Mark Zuckerberg published a detailed post Friday night describing ways the company is considering dealing with … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Facebook Considering Ways to Combat Fake News

NSA Missed ‘Big Red Flags’ in Leak Suspect’s Behavior

Year after year, both in his messy personal life and his brazen theft of classified documents from the National Security Agency, Harold T. Martin III put to the test the government’s costly system for protecting secrets. And year after year, … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on NSA Missed ‘Big Red Flags’ in Leak Suspect’s Behavior

The Biggest Cybersecurity Threats Are Insiders

The role that insiders play in the vulnerability of all sizes of corporations is massive and growing. In the 2016 Cyber Security Intelligence Index, IBM found that 60% of all attacks were carried out by insiders. Of these attacks, three-quarters … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on The Biggest Cybersecurity Threats Are Insiders