Tag Cloud
-
Recent Posts
- CV19 SelfDefense Mobile Phone App now available for download
- Women are pretending to be men on Instagram to circumvent algorithmic blocking
- Breaking New Ground in Human-Computer Interactions Research
- Hackers New Tactic: Locking All the Doors at an Expensive Hotel
- DARPA’s Master Plan to Spot Facebook Terrorists?
Archives
Monthly Archives: December 2013
Top cybersecurity threats for 2013
The top cybersecurity threats in 2013 reportedly included hacktivists targeting users’ privacy at the top spot, followed by cyberespionage campaigns – along with the newest craze of stealing bitcoins. More from the Times of India by clicking here
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Top cybersecurity threats for 2013
A cybersecurity framework for critical infrastructure
A cybersecurity framework for critical infrastructure owners will soon become a national standard for litigators and regulators. The framework is now in its final comment stage and will be released mid-February. The National Institute of Standards and Testing (NIST) will establish this comprehensive set of … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on A cybersecurity framework for critical infrastructure
A clear-eyed guide to Android’s actual security risks
If you’re an Android user — or want to be — you’ve likely heard about all the security risks of Google’s mobile operating system. But how real are these threats, and how much damage can they do? Despite the fears, … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on A clear-eyed guide to Android’s actual security risks
How (un-hackable!) Quantum Cryptology Works
By harnessing the unpredictable nature of matter at the quantum level, physicists have figured out a way to exchange information on secret keys. Check it out at HowStuffWorks.com by clicking here.
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on How (un-hackable!) Quantum Cryptology Works
How a WWII intelligence pact between the U.S. and UK forged modern surveillance
Revelations show a transatlantic intelligence pact that started during the second world war is expanding beyond states’ ability to control it. There haven’t been too many moments of levity over the past four months for those intimately involved in the story of Edward … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on How a WWII intelligence pact between the U.S. and UK forged modern surveillance