Category Critical Infrastructure Protection

Alexa, Tell Me A National Security Secret: Amazon’s Reach Goes Beyond The Post Office

Alexa, Tell Me A National Security Secret: Amazon’s Reach Goes Beyond The Post Office By Brian Naylor, www.npr.org View Original April 23rd, 2018 Amazon has been one of President Trump’s favorite targets on Twitter. He’s accused the company of not collecting taxes (which it does), charged it with putting retailers out of business — and focused his […]

8 Ways Hackers Monetize Stolen Data

8 Ways Hackers Monetize Stolen Data   http://www.fortunascorner.com      Steve Zurier posted an April 17, 2018 article to the security and technology website, DarkReading.com, with the title above.  We are all well aware that our personal data has likely been compromised many times in the past decade because of the plethora of gaps and vulnerabilities with […]

Nobody Is Safe From Russia’s Colossal Hacking Operation

Nobody is safe from Russia’s colossal hacking operation By Nicole Kobie, www.wired.co.uk View Original April 21st, 2018 No-one is too unimportant to be targeted by Russia-backed, state-sponsored hackers. While that may be good for the self-esteem, it’s bad news for online security — enough so that this week US and UK authorities teamed up to issue a joint […]

What If The Insider Threat Is You?

What if the Insider Threat Is You? thecipherbrief.com Karl WagnerFormer Chief of Counterintelligence Operations, CIA Sometimes we’re the threat, whether to ourselves or others, without even realizing it. Insider threats trace back to humans, thus, it’s at our own peril that we ignore the lessons of psychology when building our threat mitigation program. This is […]

Experts Warn ‘Trust This Computer’ Is A Massive iPhone Security Risk

Experts Warn ‘Trust This Computer’ Is a Massive iPhone Security Risk By Mike Peterson, www.idropnews.com View Original April 19th, 2018 When you first plug an iPhone into a computer, you’ll often see a pop-up that says “Trust This Computer?” And while the prompt might seem innocuous, new research suggests that it could have some serious security implications. […]

The {Cyber} Guns Of August

Quite a conclusion here: “It is difficult to get a man to understand something, when his salary depends upon his not understanding it” [31] the professor wryly replied. “Who really benefits from secure computers?” he said with a morose smile. “Consumers get less expensive systems and software with more features, companies are able to sell […]

Casino Hacked Through Its Internet-Connected Fish Tank Thermometer; Whether It Is This Technique/Method, Or, Compromising A Network Through A E-Cigarette Charger — The Vulnerabilities In The Internet-Of-Things Is Almost Endless

Casino Hacked Through Its Internet-Connected Fish Tank Thermometer; Whether It Is This Technique/Method, Or, Compromising A Network Through A E-Cigarette Charger — The Vulnerabilities In The Internet-Of-Things Is Almost Endless   http://www.fortunascorner.com     Wang Wei posted an April 15, 2018 article in the security and technology publication, TheHackerNews.com, with the title above. “Internet- connected technology, also […]

The Machine That Can Never Be Hacked: ‘Random Number Generator’ Is Created Using Quantum Physics — And, Even Supercomputers Can’t Steal Its Data

The Machine That Can Never Be Hacked: ‘Random Number Generator’ Is Created Using Quantum Physics — And, Even Supercomputers Can’t Steal Its Data http://www.fortunascorner.com      Tim Collins posted an April 12, 2018 article, with the title above, in London’s the DailyMail.com.  Mr. Collins begins by noting that “random number generators are never truly random. Most, rely […]

Hackers Can Steal Data From Air-Gapped Computers Through Power Lines; The Threat To Air Gapped Systems Continues To Escalate

Hackers Can Steal Data From Air-Gapped Computers Through Power Lines; The Threat To Air Gapped Systems Continues To Escalate   http://www.fortunascorner.com          A decade or so ago, many corporations, government entities, etc., relied on air-gapped computers to protect the ‘crown jewels’ of their organization.  Back then, security officials knew that air-gapped computers weren’t […]

Bring On The Cyber Apocalypse

Bring on the cyber apocalypse By Gary Anderson – – Tuesday, April 10, 2018 www.washingtontimes.com View Original April 10th, 2018 Facebook Freeze Illustration by Greg Groesch/The Washington Times more > ANALYSIS/OPINION: Many “progressives” — particularly millennials — were horrified to learn that some Facebook data might have been used to help elect Donald Trump president. Conservatives […]