January 2025 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Tag Cloud
-
Recent Posts
- CV19 SelfDefense Mobile Phone App now available for download
- Women are pretending to be men on Instagram to circumvent algorithmic blocking
- Breaking New Ground in Human-Computer Interactions Research
- Hackers New Tactic: Locking All the Doors at an Expensive Hotel
- DARPA’s Master Plan to Spot Facebook Terrorists?
Archives
Author Archives: admin
Lax Overseas Data Breach Laws Attract Enterprises
About 70% of organizations that store sensitive data abroad choose to do so in countries with lenient breach notification requirements! Many companies that look to process and store sensitive data — including intellectual property — abroad as a cost-cutting measure … Continue reading
Cyber attack targeted Paris G20 meeting atendees
The Group of Twenty (G-20) Finance Ministers and Central Bank Governors was established in 1999 to bring together systemically important industrialized and developing economies to discuss key issues in the global economy. Not everyone agrees with the work they are … Continue reading
A Declaration of Cyber-War
Last summer, the world’s top software-security experts were panicked by the discovery of a drone-like computer virus, radically different from and far more sophisticated than any they’d seen. The race was on to figure out its payload, its purpose, and … Continue reading
DHS Report: Digital Immigration Records Vulnerable to ‘Insider Threat’
The Department of Homeland Security’s U.S. Citizen and Immigration Services has made progress securing its cyber networks from potential insider threats. However, gaps in security still remain, including one that could allow malicious insiders to tamper with digital immigration records. … Continue reading
Study Highlights IT Security Skills Gap – and significant industry growth
Organizations are rapidly adopting new technologies, but many information security professionals may lack the requisite security skills to safely implement them, according to a report released last week at the RSA Conference. According to Frost & Sullivan’s 2011 (ISC)2 Global … Continue reading
Oil and gas firms hit by hackers
Hackers have run rampant through the networks of at least five oil and gas firms for years, reveals a report compiled by security firm McAfee which details the methods and techniques the hackers used to gain access. Via a combination … Continue reading
WikiLeaks among nominees for Nobel Peace Prize!
OSLO (Reuters) – Anti-secrecy website WikiLeaks has been nominated for the 2011 Nobel Peace Prize, the Norwegian politician behind the proposal said on Wednesday, a day after the deadline for nominations expired. The Norwegian Nobel Committee accepts nominations for what … Continue reading
Democrats Introduce Legislation For National Security Against Cyber Attacks
Cyber criminals and state adversaries pose a threat to both national security and our economy by threatening infrastructure, defense systems and global communications. Criminals and hackers probe U.S. government computer networks millions of times every day, about 9 million Americans … Continue reading
Man tries to work for CIA in order to spy for China
Glenn Duffie Shriver from Michigan was sentenced to 48 months in prison for conspiring to provide national defense information to intelligence officers of the People’s Republic of China (PRC). On Oct. 22, 2010, Shriver pleaded guilty to a one-count criminal … Continue reading
Russian Espionage: The Bear Is Back!
The uncovering of a Russian spy ring in the U.S. demonstrates that while the Cold War may have thawed, international espionage continues to thrive. Russia is fielding an army of spies in the U.S. that is at least equal in … Continue reading