Category Cybersecurity

CyCon U.S. Call For Papers Is Now Open: Full Paper Submission Deadline Is July 22, 2018

CyCon U.S. Call for Papers is now open Theme: Cyber Conflict during Competition CyCon U.S. seeks technical, legal, political, and military positions and research related to Cyber Conflict during Competition. Important Dates Full Paper Submission Deadline: July 22, 2018 Notification of Paper Acceptance: August 20, 2018 Final Paper Submission Deadline: September 17, 2018 “Inter-state strategic […]

Under Secretary Of Defense For Intelligence: ‘A Lot Of Technology Remains Untapped’

Defense intelligence chief: ‘A lot of technology remains untapped’ – SpaceNews.com spacenews.com · by Sandra Erwin · April 23, 2018 Kernan: Project Maven so far has been “extraordinarily” useful in processing intelligence but more capabilities are needed. TAMPA, FLA. — Undersecretary of Defense for Intelligence Joseph Kernan, a retired Navy vice admiral, is rarely seen or heard at […]

Alexa, Tell Me A National Security Secret: Amazon’s Reach Goes Beyond The Post Office

Alexa, Tell Me A National Security Secret: Amazon’s Reach Goes Beyond The Post Office By Brian Naylor, www.npr.org View Original April 23rd, 2018 Amazon has been one of President Trump’s favorite targets on Twitter. He’s accused the company of not collecting taxes (which it does), charged it with putting retailers out of business — and focused his […]

Virtual War And Weapons Of Mass Deception – Modern War Institute

A cautionary conclusion.  Will we heed these words? Sixteenth-century Dutch scholar Desiderius Erasmus noted that “Prevention is better than cure.” Enemies of the United States continue to probe our virtual defenses. Our rivals are building the plans to attack and win in Virtual War so that they can avoid US military overmatch capabilities in physical […]

8 Ways Hackers Monetize Stolen Data

8 Ways Hackers Monetize Stolen Data   http://www.fortunascorner.com      Steve Zurier posted an April 17, 2018 article to the security and technology website, DarkReading.com, with the title above.  We are all well aware that our personal data has likely been compromised many times in the past decade because of the plethora of gaps and vulnerabilities with […]

A Shadowy War’s Newest Front: A Drone Base Rising From Saharan Dust

Excerpts: Later this summer, workers will lay five inches of asphalt atop the rock bed. In all, commanders say they will pave some 39 acres of airfield. While built mainly for the Reaper drones, the runway and adjoining taxiways and ramps must be able to handle much heavier C-17 cargo planes. Three huge hangars capped […]

Palantir Knows Everything About You

     Blaming Peter Thiel & Palantir for excessive surveillance may be convenient for liberals and Silicon Valley; but, our personal privacy was substantially compromised long ago.  We absolutely need to have a thoughtful debate about how much surveillance is too much.  But, singling out Palantir does nothing to advance that debate; and, singles out […]

Nobody Is Safe From Russia’s Colossal Hacking Operation

Nobody is safe from Russia’s colossal hacking operation By Nicole Kobie, www.wired.co.uk View Original April 21st, 2018 No-one is too unimportant to be targeted by Russia-backed, state-sponsored hackers. While that may be good for the self-esteem, it’s bad news for online security — enough so that this week US and UK authorities teamed up to issue a joint […]

What If The Insider Threat Is You?

What if the Insider Threat Is You? thecipherbrief.com Karl WagnerFormer Chief of Counterintelligence Operations, CIA Sometimes we’re the threat, whether to ourselves or others, without even realizing it. Insider threats trace back to humans, thus, it’s at our own peril that we ignore the lessons of psychology when building our threat mitigation program. This is […]

Experts Warn ‘Trust This Computer’ Is A Massive iPhone Security Risk

Experts Warn ‘Trust This Computer’ Is a Massive iPhone Security Risk By Mike Peterson, www.idropnews.com View Original April 19th, 2018 When you first plug an iPhone into a computer, you’ll often see a pop-up that says “Trust This Computer?” And while the prompt might seem innocuous, new research suggests that it could have some serious security implications. […]