Category Encryption

Looming Digital Black Swan?  New, Rapidly Growing Internet-Of-Things (IoT) Botnet — Threatens To Take Down Entire Internet; 10,000 Devices Per Day Being Infected’ +2 Million Devices Already Infected

Looming Digital Black Swan?  New, Rapidly Growing Internet-Of-Things (IoT) Botnet — Threatens To Take Down Entire Internet; 10,000 Devices Per Day Being Infected’ +2 Million Devices Already Infected http://www.fortunascorner.com      Cyber security researchers are growing increasingly concerned that a new Internet-Of-Things (IoT) botnet could pose a threat to take down the entire Internet.   Wang Wei […]

New Anonymity Network Named Loopix Shows Promise — Could Become Alternative/Replace TOR

New Anonymity Network Named Loopix Shows Promise — Could Become Alternative/Replace TOR   http://www.fortunascorner.com        The Dark Web, and the The Onion Router (TOR), have been around since 2002; and, has been a refuge for those seeking digital anonymity — from digital privacy advocates, to the off-the-gridders, and of course the darker digital angels of our […]

How Israel Caught Russian Hackers Scouring The World For U.S. Secrets

How Israel Caught Russian Hackers Scouring the World for U.S. Secrets By Scott Shane, Nicole Perlroth, www.nytimes.com View Original October 10th, 2017 Kaspersky Lab’s products require access to everything stored on a computer in order to scour it for viruses or other dangers. Credit Sergei Ilnitsky/European Pressphoto AgencyPhoto by: Sergei Ilnitsky/European Pressphoto Agency It was a case of […]

Computer Virus Infects U.S. Military Drone Fleet

Computer virus infects US military drone fleet: report By Olivia Beavers, thehill.com View Original October 8th, 2017 Editor’s note: This story inadvertently went off reporting from a Wired.com article published in 2011. The story, as published by The Hill, incorrectly stated that the military had detected the virus two weeks ago. We regret the error. A computer virus has reportedly infected the US […]

Deter The Cyber Weapon From Being Employed: By Bing West

Deter the Cyber Weapon from Being Employed By Bing West, www.hoover.org View Original September 26th, 2017 Image credit: Poster Collection, US 02299, Hoover Institution Archives. At different historical periods, weapons emerged that changed how armies fought. Four millennia ago on the flat plains of Mesopotamia, the Assyrians employed the chariot—predecessor of the tank—to dominate all opposing tribes.1 In […]

North Korea Could Team Up With ISIS To Launch Terror Attacks ACROSS GLOBE

https://clarionproject.org/mauro-north-korea-activity-iranian-activity/ North Korea could team up with ISIS to launch terror attacks ACROSS GLOBE, experts warn By Joey Millar, www.express.co.uk View Original September 16th, 2017 Experts said Kim Jong-un’s hermit state would not hesitate to use extremist jihadis to attack their Western enemies. North Korea would actually find it easier to target their rivals using ISIS than by […]

Edward Snowden Tells German Magazine Der Spiegel: “There Is Still Hope — Even For Me”

Edward Snowden Tells German Magazine Der Spiegel: “There Is Still Hope — Even For Me”   http://www.fortunascorner.com        Martin Knobbe and Jorg Schindler, journalists with the German magazine, Der Spiegel, recently conducted an in-depth interview with U.S. fugitive Edward Snowden — who spoke about his life in Russia, the power of nation-state intelligence agencies, and […]

Cyber Warriors And Cyber Spies Struggle To Strike Balance

Cyber Warriors and Cyber Spies Struggle to Strike Balance – The Cipher Brief thecipherbrief.com Ned CarmodyFormer Case Officer, CIA On May 2, 2011 the agonizing, decade-long hunt for Osama bin Laden finally ended. The raid by U.S. Navy seals on the walled compound in Abbottabad, Pakistan was the culmination of years of intelligence gathering. Following […]

Post Equifax:  How To Stop The Next Mega-Cyber Breach — Or, At Least Slow It Down

Post Equifax:  How To Stop The Next Mega-Cyber Breach — Or, At Least Slow It Down   http://www.fortunascorner.com        Lily Hay Newman posted an article on the September 12, 2017 edition of WIRED.com, “How To Stop The Next Mega Breach — Or At Least Slow It Down,” about what steps companies can take that may not […]

Dark Reading’s 7 Takeaways From The Equifax Data Breach; And A Couple That They Overlooked

Dark Reading’s 7 Takeaways From The Equifax Data Breach; And A Couple That They Overlooked   www.fortunascorner.com        The cyber security website, DarkReading.com, posted a September 11, 2017 article, “7 Takeaways From The Equifax Data Breach,” by Jai Vijayan discussing their key observations with respect to this latest Tier I, or ‘Category 5’ cyber breach.   Application-level Vulnerabilities […]