-
Archives
- August 2020
- November 2019
- February 2018
- January 2017
- December 2016
- November 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- March 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- January 2010
-
Meta
Author Archives: conrad
Can the US voting system be hacked by anti-US interests?
The FBI has warned state officials to boost their security, since state election websites in Arizona and Illinois experienced hack-related shutdowns earlier this summer. More than 30 states have provisions for online voting. The FBI alerted Arizona officials in June … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Can the US voting system be hacked by anti-US interests?
Look out – powerful NSA hacking tools have just been hacked…
Transparency has its limits! Some of the most powerful espionage tools created by the National Security Agency’s elite group of hackers have been revealed in recent days, a development that could pose severe consequences for the spy agency’s operations and … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Look out – powerful NSA hacking tools have just been hacked…
Insider Threats are Behind a Sharp Rise in Data Theft
Insider threats are behind the sharp increases over the past 18 months in the percentage of organizations that have experienced loss of company data. According to the Ponemon Institute, three out of every four organizations (76%) have been hit over … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Insider Threats are Behind a Sharp Rise in Data Theft
The focus of cybersecurity in this next episode should be on fraud and money laundering
Australia has set up a cyber-intelligence unit to identify terrorism financing, money laundering and financial fraud online, the government said on Tuesday, because of “unprecedented” threats to national security. The measure expands on a major platform of conservative Prime Minister … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on The focus of cybersecurity in this next episode should be on fraud and money laundering
Online Trail Illuminates Baton Rouge Gunman’s Path to Violence
Though the police here have released little information about Gavin Long, a deeper portrait is beginning to emerge, based on a large trail left online. Many of these digital breadcrumbs — web posts, YouTube videos and podcasts — are tied … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Online Trail Illuminates Baton Rouge Gunman’s Path to Violence
It’s Time to Think of Cybersecurity as a Business Builder
Last year, CIO, CSO and PricewaterhouseCoopers released a new Global State of Information Security survey, which polled more than 10,000 executives from 127 countries about IT security. The results were a mixed bag, with security incidents up 38% over 2014 … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on It’s Time to Think of Cybersecurity as a Business Builder
Fighting ISIS With an Algorithm to Predict Attacks
In a study published Thursday in the journal Science, Dr. Johnson and Miami colleagues searched for pro-Islamic State posts each day from mid-2014 until August 2015, mining mentions of beheadings and blood baths in multiple languages on Vkontakte, a Russia-based … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Fighting ISIS With an Algorithm to Predict Attacks
Michigan utility downplays serious cyber attack
A water and electricity authority in the State of Michigan, Lansing’s Board of Water & Light, needed a week to recover from a ransomware attack that hit its enterprise systems recently. The successful phishing attack on its corporate systems, which … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Michigan utility downplays serious cyber attack
Malware Suspected in Bangladesh Bank Heist
Investigators suspect that malicious software code allowing hackers to withdraw the money could have been installed several weeks before the incident. Malware gave hackers an inside look at the bank’s systems. The hackers appeared to have stolen Bangladesh Bank’s credentials … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Malware Suspected in Bangladesh Bank Heist
Insider threats cause more damage than big data breaches
Experian’s just released third annual Data Breach Industry Forecast report for 2016 predicts that big hacks will continue to grab the headlines, but small breaches will cause “a lot more damage.” “Whether it’s a true malicious insider, or just employee … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Insider threats cause more damage than big data breaches