Category Encryption

NSA: Cyber Attacks Are Becoming More Sophisticated, Aggressive, Disruptive

  NSA: Cyber Attacks Are Becoming More Sophisticated, Aggressive, and Disruptive Foreign hackers combine malware, cyber techniques used by other adversaries An IT researchers shows on a giant screen a computer infected by a ransomware / Getty Images BY: Bill Gertz November 16, 2017 5:00 am Cyber attacks by foreign nations and criminals against both government […]

China Has A Breakthrough In Spy-Proof Quantum Communications

chinasunhackablenetwork China Has A Breakthrough In Spy-Proof Quantum Communications http://www.fortunascorner.com      Patrick Tucker posted a November 9, 2017 article on the national security website, DefenseOne.com, with the title above.  It is about a subject I have written extensively about on this blog — China building an ‘unhackable’ communications network in space.  Nothing is truly ‘unhackabe,’ as […]

North Korea’s Digital Divide: Online Elites, Isolated Masses

Strongly agree with David Maxwell’s observation:  “Lots of potential.  We should be exploiting this.”  RCP North Korea’s digital divide: Online elites, isolated masses By Eric Talmadge, www.fifthdomain.com View Original November 9th, 2017 PYONGYANG, North Korea (AP) — Ever so cautiously, North Korea is going online. Doctors can consult via live, online video conferencing, and lectures at prestigious […]

The Rise Of Super-Stealthy, Digitally Signed Malware — Thanks To The Dark Web

The Rise Of Super-Stealthy, Digitally Signed Malware — Thanks To The Dark Web   http://www.fortunascorner.com      Swati Khandelwal posted a November 5, 2017 article on the cyber security website, The Hacker News, with the title above.  He begins by asking, “guess what’s more expensive than counterfeit U.S. passports, stolen credit cards, and even guns on the […]

Inside Story: How Russians Hacked The Democrats’ Emails

Inside story: How Russians hacked the Democrats’ emails By RAPHAEL SATTER, JEFF DONN and CHAD DAY Today apnews.com View Original A motorcycle is parked outside the THCServers.com company headquarters, outside Craiova, southern Romania, Wednesday, Oct. 4, 2017. This company based in a remote part of the eastern European country was used to register the website […]

Looming Digital Black Swan?  New, Rapidly Growing Internet-Of-Things (IoT) Botnet — Threatens To Take Down Entire Internet; 10,000 Devices Per Day Being Infected’ +2 Million Devices Already Infected

Looming Digital Black Swan?  New, Rapidly Growing Internet-Of-Things (IoT) Botnet — Threatens To Take Down Entire Internet; 10,000 Devices Per Day Being Infected’ +2 Million Devices Already Infected http://www.fortunascorner.com      Cyber security researchers are growing increasingly concerned that a new Internet-Of-Things (IoT) botnet could pose a threat to take down the entire Internet.   Wang Wei […]

New Anonymity Network Named Loopix Shows Promise — Could Become Alternative/Replace TOR

New Anonymity Network Named Loopix Shows Promise — Could Become Alternative/Replace TOR   http://www.fortunascorner.com        The Dark Web, and the The Onion Router (TOR), have been around since 2002; and, has been a refuge for those seeking digital anonymity — from digital privacy advocates, to the off-the-gridders, and of course the darker digital angels of our […]

How Israel Caught Russian Hackers Scouring The World For U.S. Secrets

How Israel Caught Russian Hackers Scouring the World for U.S. Secrets By Scott Shane, Nicole Perlroth, www.nytimes.com View Original October 10th, 2017 Kaspersky Lab’s products require access to everything stored on a computer in order to scour it for viruses or other dangers. Credit Sergei Ilnitsky/European Pressphoto AgencyPhoto by: Sergei Ilnitsky/European Pressphoto Agency It was a case of […]

Computer Virus Infects U.S. Military Drone Fleet

Computer virus infects US military drone fleet: report By Olivia Beavers, thehill.com View Original October 8th, 2017 Editor’s note: This story inadvertently went off reporting from a Wired.com article published in 2011. The story, as published by The Hill, incorrectly stated that the military had detected the virus two weeks ago. We regret the error. A computer virus has reportedly infected the US […]

Deter The Cyber Weapon From Being Employed: By Bing West

Deter the Cyber Weapon from Being Employed By Bing West, www.hoover.org View Original September 26th, 2017 Image credit: Poster Collection, US 02299, Hoover Institution Archives. At different historical periods, weapons emerged that changed how armies fought. Four millennia ago on the flat plains of Mesopotamia, the Assyrians employed the chariot—predecessor of the tank—to dominate all opposing tribes.1 In […]