December 2025 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Tag Cloud
-
Recent Posts
- CV19 SelfDefense Mobile Phone App now available for download
- Women are pretending to be men on Instagram to circumvent algorithmic blocking
- Breaking New Ground in Human-Computer Interactions Research
- Hackers New Tactic: Locking All the Doors at an Expensive Hotel
- DARPA’s Master Plan to Spot Facebook Terrorists?
Archives
Category Archives: Cybersecurity Memo – Insiders Edition
Your iPhone Is (Secretly) Tracking Everywhere You’ve Been!
It turns out that all our iPhones are keeping a record of everywhere you’ve been since June. This data is stored on your phone (or iPad) and computer, easily available to anyone who gets their hands on it. The enormous … Continue reading
U.S. shuts down massive cyber theft ring
WASHINGTON/BOSTON (Reuters) – U.S. authorities claimed one of their biggest victories against cyber crime as they shut down a ring they said used malicious software to take control of more than 2 million PCs around the world, and may have … Continue reading
‘LizaMoon’ Mass SQL Injection Attack Escalates Out of Control – one million sites compromised!
Millions of unique URLs have been infected with a rampant SQL injection attack Websense has dubbed “LizaMoon.” The SQL injection attack redirects users to a fake AV site. A mass SQL injection attack that initially compromised 28,000 websites has spiraled … Continue reading
Lax Overseas Data Breach Laws Attract Enterprises
About 70% of organizations that store sensitive data abroad choose to do so in countries with lenient breach notification requirements! Many companies that look to process and store sensitive data — including intellectual property — abroad as a cost-cutting measure … Continue reading
Cyber attack targeted Paris G20 meeting atendees
The Group of Twenty (G-20) Finance Ministers and Central Bank Governors was established in 1999 to bring together systemically important industrialized and developing economies to discuss key issues in the global economy. Not everyone agrees with the work they are … Continue reading
A Declaration of Cyber-War
Last summer, the world’s top software-security experts were panicked by the discovery of a drone-like computer virus, radically different from and far more sophisticated than any they’d seen. The race was on to figure out its payload, its purpose, and … Continue reading
DHS Report: Digital Immigration Records Vulnerable to ‘Insider Threat’
The Department of Homeland Security’s U.S. Citizen and Immigration Services has made progress securing its cyber networks from potential insider threats. However, gaps in security still remain, including one that could allow malicious insiders to tamper with digital immigration records. … Continue reading
Study Highlights IT Security Skills Gap – and significant industry growth
Organizations are rapidly adopting new technologies, but many information security professionals may lack the requisite security skills to safely implement them, according to a report released last week at the RSA Conference. According to Frost & Sullivan’s 2011 (ISC)2 Global … Continue reading
Oil and gas firms hit by hackers
Hackers have run rampant through the networks of at least five oil and gas firms for years, reveals a report compiled by security firm McAfee which details the methods and techniques the hackers used to gain access. Via a combination … Continue reading
WikiLeaks among nominees for Nobel Peace Prize!
OSLO (Reuters) – Anti-secrecy website WikiLeaks has been nominated for the 2011 Nobel Peace Prize, the Norwegian politician behind the proposal said on Wednesday, a day after the deadline for nominations expired. The Norwegian Nobel Committee accepts nominations for what … Continue reading