Author Archives: conrad

Can the US voting system be hacked by anti-US interests?

The FBI has warned state officials to boost their security, since state election websites in Arizona and Illinois experienced hack-related shutdowns earlier this summer. More than 30 states have provisions for online voting. The FBI alerted Arizona officials in June … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Can the US voting system be hacked by anti-US interests?

Look out – powerful NSA hacking tools have just been hacked…

Transparency has its limits! Some of the most powerful espionage tools created by the National Security Agency’s elite group of hackers have been revealed in recent days, a development that could pose severe consequences for the spy agency’s operations and … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Look out – powerful NSA hacking tools have just been hacked…

Insider Threats are Behind a Sharp Rise in Data Theft

Insider threats are behind the sharp increases over the past 18 months in the percentage of organizations that have experienced loss of company data.  According to the Ponemon Institute, three out of every four organizations (76%) have been hit over … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Insider Threats are Behind a Sharp Rise in Data Theft

The focus of cybersecurity in this next episode should be on fraud and money laundering

Australia has set up a cyber-intelligence unit to identify terrorism financing, money laundering and financial fraud online, the government said on Tuesday, because of “unprecedented” threats to national security. The measure expands on a major platform of conservative Prime Minister … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on The focus of cybersecurity in this next episode should be on fraud and money laundering

Online Trail Illuminates Baton Rouge Gunman’s Path to Violence

Though the police here have released little information about Gavin Long, a deeper portrait is beginning to emerge, based on a large trail left online. Many of these digital breadcrumbs — web posts, YouTube videos and podcasts — are tied … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Online Trail Illuminates Baton Rouge Gunman’s Path to Violence

It’s Time to Think of Cybersecurity as a Business Builder

Last year, CIO, CSO and PricewaterhouseCoopers released a new Global State of Information Security survey, which polled more than 10,000 executives from 127 countries about IT security. The results were a mixed bag, with security incidents up 38% over 2014 … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on It’s Time to Think of Cybersecurity as a Business Builder

Fighting ISIS With an Algorithm to Predict Attacks

In a study published Thursday in the journal Science, Dr. Johnson and Miami colleagues searched for pro-Islamic State posts each day from mid-2014 until August 2015, mining mentions of beheadings and blood baths in multiple languages on Vkontakte, a Russia-based … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Fighting ISIS With an Algorithm to Predict Attacks

Michigan utility downplays serious cyber attack

A water and electricity authority in the State of Michigan, Lansing’s Board of Water & Light, needed a week to recover from a ransomware attack that hit its enterprise systems recently. The successful phishing attack on its corporate systems, which … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Michigan utility downplays serious cyber attack

Malware Suspected in Bangladesh Bank Heist

Investigators suspect that malicious software code allowing hackers to withdraw the money could have been installed several weeks before the incident. Malware gave hackers an inside look at the bank’s systems. The hackers appeared to have stolen Bangladesh Bank’s credentials … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Malware Suspected in Bangladesh Bank Heist

Insider threats cause more damage than big data breaches

Experian’s just released third annual Data Breach Industry Forecast report for 2016 predicts that big hacks will continue to grab the headlines, but small breaches will cause “a lot more damage.” “Whether it’s a true malicious insider, or just employee … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Insider threats cause more damage than big data breaches