Hacker hijacked YouTube channels to milk AdSense for money

January 13, 2014

Naked Security

via Hacker hijacked YouTube channels to milk AdSense for money.

Biometrics Researchers See a World Without Passwords

November 26, 2013

Biometrics Researchers See a World Without Passwords

Some Purdue University researchers are working on technology that could see all those passwords that computer users must punch in replaced with steps such as iris and fingerprint scans.
The basement lab of Purdue University’s International Center for Biometrics Research is where such emerging biometric technologies are tested for weaknesses before going mainstream.

A New ‘Dawn’ in Exchanges’ War on Hackers

August 18, 2013

A New ‘Dawn’ in Exchanges’ War on Hackers

Gaining access to computers used by programmers who work on exchanges’ trading systems could let a hacker set a time-bomb to disrupt markets or open a back door to enable further meddling. Taking over a brokerage’s trading operation and releasing a wave of fake orders is another threat, potentially destabilizing the victimized firm and leaving scores more holding unwanted positions.

Can Next Gen Phones Deliver Next Gen Security?

August 18, 2013

Can Next Gen Phones Deliver Next Gen Security?

Biometrics haven’t made significant inroads on any device, and forthcoming technologies like Google Glass still seem a long way from being secure. Hopefully, the brains behind the electronic toys will continue baking in device security.

Survival of the Fittest: New York Times Attackers Evolve Quickly

August 12, 2013

Survival of the Fittest: New York Times Attackers Evolve Quickly

As long as these actors regularly achieve their objective (stealing sensitive data), they are not motivated to update or rethink their techniques, tactics, or procedures (TTPs). These threat actors’ tactics follow the same principles of evolution – successful techniques propagate, and unsuccessful ones are abandoned. Attackers do not change their approach unless an external force or environmental shift compels them to. As the old saying goes: If it ain’t broke, don’t fix it.

Quantum Mechanics: The Answer to Cybersecurity?

June 24, 2013

Quantum Mechanics: The Answer to Cybersecurity?

Quantum cryptography could prevent hacking because such a security system relying on quantum mechanics could destroy or change messages at the same time as hackers are trying to break into them, as ABC says. Hackers can now intercept messages and data or destroy or alter these without the sender knowing. In quantum cryptography, the very act of hacking would destroy the data at that very moment.

Cyber Security in the Internet of Things

June 23, 2013

Cyber Security in the Internet of Things

Succeeding in the IoT era will depend on defining and deploying not only the right cybersecurity technologies, but also the right policies and operations. The potential of the IoT to yield value for you, your customers, and all of society is vast. We must rethink the cyber security regimes that threaten to limit it.

The cyber security challenge

June 11, 2013

The cyber security challenge

he popular and specialized literature is replete with articles analyzing the problem and advocating responses to this challenge. Congress is mobilizing committees and sub-committees to address the myriad of issues that cyber technology has raised. The National Academies have already conducted several major studies looking at the appropriateness of offensive operations, cyber deterrence, and other issues. This is taking place as the executive branch conducts an intensive effort to sort out areas of authority and responsibility so that there is a coherent governmental approach to the challenge.

Silent War – the changing nature of the new cyber-warfare

June 10, 2013

Silent War – the changing nature of the new cyber-warfare

On the hidden battlefields of history’s first known cyber-war, the casualties are piling up. In the U.S., many banks have been hit, and the telecommunications industry seriously damaged, likely in retaliation for several major attacks on Iran. Washington and Tehran are ramping up their cyber-arsenals, built on a black-market digital arms bazaar, enmeshing such high-tech giants as Microsoft, Google, and Apple.

Don’t pop those free thumb drives into your computer

June 2, 2013

Don’t pop those free thumb drives into your computer

U.S. Rep. Mike Rogers offered a warning Friday to participants at the Mackinac Policy Conference: Don’t pop those free thumb drives into your computer.

“It’s the most common way to interject a virus into your computer,” the Howell Republican told the Mackinac Island audience of state political, business and nonprofit leaders. “You wouldn’t see gum on the street and pick it up and pop it in the our mouth.”

An Internet that learns to defend itself

May 30, 2013

An Internet that learns to defend itself

An intelligence-driven security model consists of a thorough understanding of risk, the use of agile controls based on pattern recognition and predictive analytics to replace outdated controls, together with the ability to analyze vast streams of data to produce actionable information,

Cyberwar as Easy as Angry Birds

May 30, 2013

Cyberwar as Easy as Angry Birds

For the last year, the Pentagon’s top technologists have been working on a program that will make cyberwarfare relatively easy. It’s called Plan X. And if this demo looks like a videogame or sci-fi movie or a sleek Silicon Valley production, that’s no accident. It was built by the designers behind some of Apple’s most famous computers — with assistance from the illustrators who helped bringTransformers to the silver screen.

Is “cyber war” just a scare tactic?

May 28, 2013

Is “cyber war” just a scare tactic?

interesting viewpoint

Obama Administration & Cybersecurity

February 25, 2013

This week on the Communicators, Michael Daniel, Special Assistant to the President & White House Cybersecurity Coordinator. He discusses the President’s cybersecurity order issued last week (on Feb. 12), the mushrooming of cyberattacks and hacking overall, as well reports of an increasing number of cyberattacks on the U.S. from China.

Executive order on cybersecurity coming after State of the Union address

February 11, 2013

Executive order on cybersecurity coming after State of the Union address

The administration, which has been drafting the order for at least six months, plans to set up voluntary cybersecurity standards for owners and operators of critical infrastructure such as water treatment plants, electric utilities and railway systems. 

 

CISPA’s back: Hacking, online espionage resurrect cybersecurity bill

February 9, 2013

CISPA’s back: Hacking, online espionage resurrect cybersecurity bill

The Cyber Intelligence Sharing and Protection act (CISPA) will be reintroduced before the US House next week following a spate of cyber espionage and hacking attacks. Civil liberties advocates have criticized the bill for violating privacy laws.

 

The future of internet is intelligent machines

December 1, 2012

The future of internet is intelligent machines

In the near future, I expect nothing short of an open, global fabric of highly intelligent machines that connect, communicate and cooperate with us. This Industrial Internet is not about a world run by robots, it is about combining the world’s best technologies to solve our biggest challenges. It’s about economically and environmentally sustainable energy, curing the incurable diseases, and preparing our infrastructure and cities for the next 100 years.

To do this industry and government need to work together on two critical areas: standardization and security.

When It Comes to Security, We’re Back to Feudalism

December 1, 2012

When It Comes to Security, We’re Back to Feudalism

Feudalism provides security. Classical medieval feudalism depended on overlapping, complex, hierarchical relationships. There were oaths and obligations: a series of rights and privileges. A critical aspect of this system was protection: vassals would pledge their allegiance to a lord, and in return, that lord would protect them from harm.

US Researchers Create Invisible QR Codes

September 18, 2012

TechWeek / Max Smolaks

Researchers from the University of South Dakota and South Dakota School of Mines and Technology have developed invisible QR codes that could be used to help fight the trade of counterfeit goods and money.

The codes, composed from nanoparticles combined with fluorescent ink, are undetectable in everyday conditions, but start to shine brightly once exposed to infrared light.

Cybersecurity order in the works

September 18, 2012

The HIll / Brandon Sasso

Comprehensive legislation remains essential to improve the cybersecurity of the nation’s core critical infrastructure, to facilitate cyber information sharing between the government and the private sector, to strengthen and clarify the existing patchwork of authorities regarding federal network security, and to protect the privacy and civil liberties of American people….


Follow

Get every new post delivered to your Inbox.

Join 1,113 other followers