November 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Tag Cloud
-
Recent Posts
- CV19 SelfDefense Mobile Phone App now available for download
- Women are pretending to be men on Instagram to circumvent algorithmic blocking
- Breaking New Ground in Human-Computer Interactions Research
- Hackers New Tactic: Locking All the Doors at an Expensive Hotel
- DARPA’s Master Plan to Spot Facebook Terrorists?
Archives
Category Archives: Cybersecurity Memo – Insiders Edition
Insider threats cause more damage than big data breaches
Experian’s just released third annual Data Breach Industry Forecast report for 2016 predicts that big hacks will continue to grab the headlines, but small breaches will cause “a lot more damage.” “Whether it’s a true malicious insider, or just employee … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Insider threats cause more damage than big data breaches
How malware peddlers trick users into enabling MS-Office Word macros
“One popular social engineering trick to entice users to enable macros, is to make the user believe that the document contains secret or confidential information, and that the user needs to take action to reveal this information,” Didier Stevens explained. … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on How malware peddlers trick users into enabling MS-Office Word macros
MIT algorithm emulates human intuition in big data analysis
Max Kanter, who created the algorithm as part of his master’s thesis at MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL), entered the algorithm into three major big data competitions. In a paper to be presented this week at IEEE International Conference … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on MIT algorithm emulates human intuition in big data analysis
Online Dating Made This Woman a Pawn in a Global Crime Plot
According to the Internet Crime Complaint Center, American victims of online romance scams lost more than $87 million in 2014 (compared with just $50 million in 2011). The intimate details of one woman’s foray into an online relationship that resulted … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Online Dating Made This Woman a Pawn in a Global Crime Plot
If you counted all the bits in one petabyte at one bit per second, it would take 285 million years.
nuff said! it’s all about the data! http://www.computerweekly.com/feature/What-does-a-petabyte-look-like
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on If you counted all the bits in one petabyte at one bit per second, it would take 285 million years.
Employees are the biggest threat to network security
“The days when firewalls, data backup and antivirus programs provided sufficient protection are over” according to Corey Steele, network security engineer for local voice and data network solutions provider High Point Networks. “A network that’s protected just by a firewall, … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Employees are the biggest threat to network security
Next-Generation Cybersecurity Is All About Behavior Recognition
Rather than focusing on stopping cybercriminals with walls, new technologies are emerging that work to identify cybercriminals instead. For example, BioCatch technology works to identify patterns of user behavior in certain applications, creating user profiles that can then be matched … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Next-Generation Cybersecurity Is All About Behavior Recognition
“I love technology but I’m not in love with technology. The human hunch is priceless.”
A recent survey of government cybersecurity professionals found that 86 percent of respondents believe big data analytics could help improve cybersecurity, but only 28 percent are currently fully leveraging big data for security purposes. Amir Orad built his career at … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on “I love technology but I’m not in love with technology. The human hunch is priceless.”
Hacker remotely crashes Jeep from 10 miles away
“All they have to do is work out the car’s IP address and know how to break into its systems and they can take control ” In his disturbing account Greenberg described how the air vents started blasting out cold … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Hacker remotely crashes Jeep from 10 miles away
iOS flaw tricks you into giving up your iCloud password
Successful hack attacks often happen not because of tricky coding, but plain old “social engineering” — ie, conning people. The latest version of iOS, 8.3, apparently fails to filter out potentially dangerous HTML code embedded in incoming emails. The researcher’s … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on iOS flaw tricks you into giving up your iCloud password