Category identity management

North Korea’s Elite Quitting Facebook, Concealing Internet Activity: Researcher

North Korea’s elite quitting Facebook, concealing internet activity: researcher By Dustin Volz, www.reuters.com View Original April 25th, 2018 WASHINGTON (Reuters) – North Korea’s ruling class has in recent months abandoned Western social media sites such as Facebook (FB.O), Instagram and Alphabet’s Google (GOOGL.O) and dramatically increased its use of tools that cloak internet activity, according to cyber […]

8 Ways Hackers Monetize Stolen Data

8 Ways Hackers Monetize Stolen Data   http://www.fortunascorner.com      Steve Zurier posted an April 17, 2018 article to the security and technology website, DarkReading.com, with the title above.  We are all well aware that our personal data has likely been compromised many times in the past decade because of the plethora of gaps and vulnerabilities with […]

Digital Footprints: How To Find Out What Facebook And Google Know About You

https://www.voanews.com/a/facebook-google-personal-information/4339902.html Digital Footprints: How to Find Out What Facebook and Google Know About You Michelle QuinnSAN FRANCISCO — As Facebook CEO Mark Zuckerberg testifies in front of Congress about the company’s practices this week, Americans are waking up to just how much personal information tech companies have collected about them. Facebook said it will begin […]

APNewsBreak: U.S. Suspects Cellphone Spying Devices In D.C.

You mean there is “gambling going on in this casino?”  RCP, fortunascorner.com APNewsBreak: US suspects cellphone spying devices in DC apnews.com View Original For the first time, the U.S. government has publicly acknowledged the existence in Washington of what appear to be rogue devices that foreign spies and criminals could be using to track individual […]

No Facebook Or Twitter? You’re Probably A Spy.

No Facebook or Twitter? You’re Probably a Spy. thecipherbrief.com · by | Levi Maxey · February 27, 2018 Bottom Line: A spy’s tradecraft must constantly evolve because of the rapid changes of the digital age – especially the tools and skills required to maintain a legend, or cover identity. Virtual recordkeeping, modern surveillance technology and the vast amounts of a […]

The Dark Web Is Even Bigger Than Previously Thought:  3,000 Data Bases With 200 Million Unique Accounts Found; And Cyber Villains…Harder To Identify

The Dark Web Is Even Bigger Than Previously Thought:  3,000 Data Bases With 200 Million Unique Accounts Found; And Cyber Villains…Harder To Identify www.fortunascorner.com      A writer who goes by the ‘handle’ Wagas, posted a February 23, 2018 article to the security/technology website, HackRead.com, about the ever-expanding Dark Web.  As Wagas notes, “the Dark Web is a strange place, […]

A Soft(Ware) Approach To Threats From Within: Mitigating The Insider Threat With Threat-Detection Software

A Soft(ware) Approach to Threats from Within: Mitigating the Insider Threat with Threat-Detection Software By Sonny James Santistevan, georgetownsecuritystudiesreview.org View Original November 9th, 2017 GSSR Cyber Security, Intelligence, The Forum, US National Security 0 A SoftPhoto by: ware Photo Credit: New York Times Growing concerns about the prevalence and increasing regularity of insider threat breaches within the United States Government and private […]

How To Track The Original Location Of An Email Via Its IP Address

This isn’t bullet-proof.  Spoofing, stealth malware, and so on.  A sophisticated cyber adversary/thief can and do make digital attribution a challenge to say the least.  And, if they muddy their digital tracks well enough, false-flag ops, etc., it will cost you a lot of time and money to eventually locate the IP.  And by then, […]

Cardio Scan Authentication — Your Heart As Your Password

Cardio Scan Authentication — Your Heart As Your Password http://www.fortunascorner.com      Your heartbeat, as your authentication for your networked devices?  That’s one initiative underway by some technology firms to try and establish a more secure way of preventing cyber thieves from hacking into our devices.  Swati Khandelwal writes on the September 26, 2017 online […]

Facial Recognition Software Can Now Identify People Even If There Face Is COVERED In A Breakthrough That Will Quickly Unmask Criminals — Implications For Undercover Operatives?

Facial Recognition Software Can Now Identify People Even If There Face Is COVERED In A Breakthrough That Will Quickly Unmask Criminals — Implications For Undercover Operatives?   http://www.fortunascorner.com        One of the most important challenges that any intelligence or law enforcement agency has to confront is — how to keep their most precious […]