January 2025 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Tag Cloud
-
Recent Posts
- CV19 SelfDefense Mobile Phone App now available for download
- Women are pretending to be men on Instagram to circumvent algorithmic blocking
- Breaking New Ground in Human-Computer Interactions Research
- Hackers New Tactic: Locking All the Doors at an Expensive Hotel
- DARPA’s Master Plan to Spot Facebook Terrorists?
Archives
Author Archives: conrad
Cybersecurity Vs. Privacy is changing our approach to cybersecurity
Ted Schlein of KPCB: “We are in midst of cybersecurity technology being completely re-made – moving from a signature-based protection environment to a more behavioral anomaly-based protection environment.” Video interview by … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Cybersecurity Vs. Privacy is changing our approach to cybersecurity
Cisco Systems Report: Shortage of over a million cybersecurity experts globally
A Cisco security report released on January 16th 2014 shows that hacker threats reached “startling levels” last year and that the world is suffering from a shortage of skilled computer defenders. Cracks in defenses and weapons for attacks rose to … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Cisco Systems Report: Shortage of over a million cybersecurity experts globally
Large botnet traced back to hacked refrigerator
Call it the attack of the zombie refrigerators. Computer security researchers said this week they discovered a large “botnet” which infected Internet-connected home appliances and then delivered more than 750,000 malicious emails. The California security firm Proofpoint, Inc., said hackers … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Large botnet traced back to hacked refrigerator
Cybersecurity is for the C-suite, not just the IT crowd
“Ninety-seven percent of Fortune 500 companies have been hacked,” says Peter W. Singer, “and likely the other 3% have too, they just don’t know it.” Such is the less-than-rosy picture painted by Singer — director of the Center for 21st … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Cybersecurity is for the C-suite, not just the IT crowd
Top cybersecurity threats for 2013
The top cybersecurity threats in 2013 reportedly included hacktivists targeting users’ privacy at the top spot, followed by cyberespionage campaigns – along with the newest craze of stealing bitcoins. More from the Times of India by clicking here
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Top cybersecurity threats for 2013
A cybersecurity framework for critical infrastructure
A cybersecurity framework for critical infrastructure owners will soon become a national standard for litigators and regulators. The framework is now in its final comment stage and will be released mid-February. The National Institute of Standards and Testing (NIST) will establish this comprehensive set of … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on A cybersecurity framework for critical infrastructure
A clear-eyed guide to Android’s actual security risks
If you’re an Android user — or want to be — you’ve likely heard about all the security risks of Google’s mobile operating system. But how real are these threats, and how much damage can they do? Despite the fears, … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on A clear-eyed guide to Android’s actual security risks
How (un-hackable!) Quantum Cryptology Works
By harnessing the unpredictable nature of matter at the quantum level, physicists have figured out a way to exchange information on secret keys. Check it out at HowStuffWorks.com by clicking here.
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on How (un-hackable!) Quantum Cryptology Works
How a WWII intelligence pact between the U.S. and UK forged modern surveillance
Revelations show a transatlantic intelligence pact that started during the second world war is expanding beyond states’ ability to control it. There haven’t been too many moments of levity over the past four months for those intimately involved in the story of Edward … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on How a WWII intelligence pact between the U.S. and UK forged modern surveillance
Why we are losing the cyber security war and what we can do about it
If this year’s attacks on Adobe, LexisNexis, NASDAQ, US Airways, and dozens of other large and technologically sophisticated US enterprises didn’t provide sufficient evidence that we are losing the cyber security war, the ongoing breaches by Anonymous make it undeniable. … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Why we are losing the cyber security war and what we can do about it