Category identity management

How To Steal a Mobile Phone Number & Everything Linked To It  — Meet Signaling System 7, A Hacker’s Best Friend

How To Steal a Mobile Phone Number & Everything Linked To It  — Meet Signaling System 7, A Hacker’s Best Friend   www.frotunascorner.com        Steven Melendez has a July 18, 2017 article on the website, FastCompany, with the title above.  Mr. Melendez begins by writing how even the most tech-savvy can still be vulnerable, and […]

Staying Secret in The Age Of Social Media

Staying Secret in The Age Of Social Media thecipherbrief.com · July 19, 2017 July 19, 2017 | Mark Kelton Mark Kelton Former Deputy Director for Counterintelligence, CIA National Clandestine Service Intelligence officers must often use a false identity – a legend or cover. How has social media and digital technology changed how they create and preserve these cover […]

How Hostile Spies Study Social Media to Crack CIA Cover, Spot Likely Agents

How Hostile Spies Study Social Media to Crack CIA Cover, Spot Likely Agents thecipherbrief.com · July 19, 2017 July 19, 2017 | Daniel Hoffman The Newsletter Get exclusive analysis delivered to your inbox daily. subscribe now Daniel Hoffman Former Chief of Station, Central Intelligence Agency Intelligence officers’ tradecraft is highly guarded for good reason. One of its most […]

‘Click Here To Kill Everyone,’:  Internet Of Things (IoT) Physical Attack Exploit To Be Revealed At Upcoming Black Hat Convention In Las Vegas, July 26-27, 2017; 20th Year Of Annual Gathering Of World’s Elite White Hat Hackers 

‘Click Here To Kill Everyone,’:  Internet Of Things (IoT) Physical Attack Exploit To Be Revealed At Upcoming Black Hat Convention In Las Vegas, July 26-27, 2017; 20th Year Of Annual Gathering Of World’s Elite White Hat Hackers    http://www.fortunascorner.com       For the 20th straight year, the world’s most — must-attend event — for the […]

“Identity Intel Ops” Turn U.S. Special Operators Into Combat Detectives

Excerpts: Though it’s just one piece of the intelligence puzzle, so-called “identity intelligence,” or I2, has become an essential part of the action cycle, which broadly involves gathering information, tracking individual terrorists, neutralizing them, and then repeating the process with any new data obtained during those raids. U.S. Special Operations Command (SOCOM) has codified these […]

“Everybody Lies: Big Data, New Data, And What The Internet Can Tell Us About Who We Really Are”

“Everybody Lies:  Big Data, New Data, And What The Internet Can Tell Us About Who We Really Are” https://fortunascorner.com      The above, is the title of new book just out this week by Seth Stephens Davidowitz; and published by Harper Collins.  Mr. Davidowitz was interviewed this morning (Friday/May 12, 2017) on CNBC’s Squawk Box. […]

The Dangerous Mission To Undermine North Korea With Flash Drives — Evil Personified, Can Only Be Extinguished With Terminal Authority, I.E., Guns And Bombs,By Those Who Will Open The Hearts And Minds Of The Average North Korean To A Better And More Meaningful Existence, And Future

The Dangerous Mission To Undermine North Korea With Flash Drives — Evil Personified, Can Only Be Extinguished With Terminal Authority, I.E., Guns And Bombs,By Those Who Will Open The Hearts And Minds Of The Average North Korean To A Better And More Meaningful Existence, And Future   www.fortunascorner.com        A May 8, 2017 article […]

Famed Hacker Kevin Mitnick On How You Can Go ‘Invisible’ Online And Hide Your Digital Tracks

Famed Hacker Kevin Mitnick On How You Can Go ‘Invisible’ Online And Hide Your Digital Tracks   https://fortunascorner.com        Kevin Mitnick, for those of you who do not recognize the name is, according to his Wikipedia bio, “an American computer [cyber] consultant, author, and hacker — best known for his high-profile 1995 arrest; […]

The ‘Invisible’ Malware That Allows Hackers To Remotely Control ATMs: Experts Warn Software Has Already Infected At Least 140 Banks In 40 Countries Around The World

The ‘Invisible’ Malware That Allows Hackers To Remotely Control ATMs:  Experts Warn Software Has Already Infected At Least 140 Banks In 40 Countries Around The World www.fortunaascorner.com      Stacy Liberatore writes in the February 9, 2017 edition of the Daily Mail Online about a new technique/tool that cyber criminals are using to steal cash […]

‘Cloaking’ Film For Windows Blacks Out The Screens Within — A Step Forward For Digital Privacy

‘Cloaking’ Film For Windows Blacks Out The Screens Within — A Step Forward For Digital Privacy   https://fortunascorner.com        You had to figure it was only a matter of time.  With the FBI Director, among others warning everyday Americans to cover up their laptop cameras — otherwise, you can be clandestinely seen and […]