Computer Ethics a...
Follow
Find
482 views | +0 today
 
Rescooped by Matthew *Matt Warren from Future Knowledge Management
onto Computer Ethics and Information Security
Scoop.it!

2013 Top 100 Influencers in Knowledge Management | MindTouch #KM

2013 Top 100 Influencers in Knowledge Management | MindTouch #KM | Computer Ethics and Information Security | Scoop.it

By: LISA HOOVER

In an effort to chart the power nodes in the social graph of various technology industry disciplines, MindTouch has a history of  researching and producing a list of influencers. This began as an internal project to understand sectors important to MindTouch and since 2009 MindTouch has published these reports to the advantage of the community at large.  Last week we shared our internal annual report of Techcomm influencers that we produced using LittleBird. This year, MindTouch also analyzed Knowledge Management influencers. As has been the case in the past, MindTouch is again making this list available to the community with the hope that this will strengthen the community, create new relationship and hopefully spark some discussion.


Via Karen du Toit
more...

From around the web

Computer Ethics and Information Security
Bring together information on computer ethics
Your new post is loading...
Your new post is loading...
Scooped by Matthew *Matt Warren
Scoop.it!

Wyden: Cyber Bill Allows Massive Increase in Government Surveillance, Fails on Security | Senator Ron Wyden

Wyden: Cyber Bill Allows Massive Increase in Government Surveillance, Fails on Security | Senator Ron Wyden | Computer Ethics and Information Security | Scoop.it
Washington, D.C. U.S. Senator Ron Wyden, D-Ore., today reiterated his concerns about a cybersecurity bill that would cre
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Obama Emergency Cyber Sanctions 'Another Salvo In War On Legitimate Hackers'

Obama Emergency Cyber Sanctions 'Another Salvo In War On Legitimate Hackers' | Computer Ethics and Information Security | Scoop.it
Critics of Obama's emergency plans to sanction hackers who threaten national infrastructure are concerned legitimate researchers could be under threat as a result.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Hacking the Internet of Things - TheIoT

Hacking the Internet of Things - TheIoT | Computer Ethics and Information Security | Scoop.it
The IoT - All The Internet of Things! The most comprehensive & up to date collection of IoT links that you can find.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Monica Lewinsky's Response to Internet Bullying Deserves a Standing Ovation

Monica Lewinsky's Response to Internet Bullying Deserves a Standing Ovation | Computer Ethics and Information Security | Scoop.it
"I was Patient Zero of losing a personal reputation on a global scale."
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Cyber criminals target financial professionals involved in deal-making - The National

Cyber criminals target financial professionals involved in deal-making - The National | Computer Ethics and Information Security | Scoop.it
Cyber crime is most associated with fraudsters taking money off ordinary gullible computer users, bu...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Teen hacks car with $15 worth of parts

Teen hacks car with $15 worth of parts | Computer Ethics and Information Security | Scoop.it
With just a little soldering and assembly, a 14-year-old built a device to wirelessly communicate with a vehicle's controller area network (CAN) and remotely start and unlock the vehicle.
more...
No comment yet.
Rescooped by Matthew *Matt Warren from The Political Side of Things
Scoop.it!

Health insurer Premera hit by "sophisticated cyberattack"

Health insurer Premera hit by "sophisticated cyberattack" | Computer Ethics and Information Security | Scoop.it
Cybercriminals may have gained access to members' Social Security numbers, addresses and more

Via Ken Feltman
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

iSpy: The CIA Campaign to Steal Apple's Secrets

iSpy: The CIA Campaign to Steal Apple's Secrets | Computer Ethics and Information Security | Scoop.it
Researchers working with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Anonymous: New Hacking Group Targets Kanye West, Kim Kardashian, Even ... - The Inquisitr

Anonymous: New Hacking Group Targets Kanye West, Kim Kardashian, Even ... - The Inquisitr | Computer Ethics and Information Security | Scoop.it
Kanye West looks to have been targeted by hackers, after the cyber terrorist group known as Anonymous launched a scathing attack on the rapper, which included
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

NSA Cyber Security - Enterprise For Partnership - Maryland Trust Commonwealth National Security

NSA Cyber Security - Enterprise For Partnership - Maryland Trust Commonwealth National Security | Computer Ethics and Information Security | Scoop.it
UK GOVERNMENT DA-NOTICE NEWS BLACKOUT - MAINSTREAM MEDIA EXTRACTS I The Sensational Carroll Foundation Trust And Parallel Carroll Maryland Trust Multi-billion Dollar Offshore Tax Fraud Bribery Scandal Which Is Now Encircling The Beleaguered UK Attorney...
more...
No comment yet.
Rescooped by Matthew *Matt Warren from Creative teaching and learning
Scoop.it!

Teaching About Cybersecurity: Taking Steps to Improve Online Safety and Prevent Data Breaches

Teaching About Cybersecurity: Taking Steps to Improve Online Safety and Prevent Data Breaches | Computer Ethics and Information Security | Scoop.it
In this lesson, students will learn about the extent of cyberattacks just in the past year and the risks they pose for companies, governments and individuals.

Via Leona Ungerer
more...
No comment yet.
Rescooped by Matthew *Matt Warren from SME Cyber Security
Scoop.it!

Kaspersky Lab says cyber attacks on corporate sector doubled in past year

Kaspersky Lab says cyber attacks on corporate sector doubled in past year | Computer Ethics and Information Security | Scoop.it
Washington, Dec 11 (ANI): Moscow-based cyber security firm Kaspersky Lab has revealed that cyber attacks on the corporate sector have doubled in the past year, with targeted attacks and malicious campaigns leading the way.

Via Institute for Critical Infrastructure Technology, Roger Smith
more...
Institute for Critical Infrastructure Technology's curator insight, December 14, 2014 6:25 PM

Washington, Dec 11 (ANI): Moscow-based cyber security firm Kaspersky Lab has revealed that cyber attacks on the corporate sector havedoubled in the past year, with targeted attacks and malicious campaigns leading the way.

 

 

Kaspersky Lab's Global Research and Analysis Teamhas reported on seven advanced persistent cyber-attack campaigns (APTs) in the past year. Between them, these accounted for more than 4,400corporate sector targets in at least 55 countries worldwide; more than double the 1,800 targeted corporate attacks discovered in 2013.

Targeted attacks and malicious campaigns stood out amongst a range of security incidents, particularly in terms of their scale and impact across both government and business, PC World reported.

In 2014, organisations in at least 20 critical sectors were hit by advanced threat actors, which included major public organisations, also including government and diplomatic offices, with further attacks on sensitive financial and industrial segments across the private sector, including attacks on media organisations.

Kaspersky Lab chief security expert, Alex Gostev, said that the targeted operations could mean disaster for the victim, resulting in leaks to sensitive information such as intellectual property, compromised corporate networks, interrupted business processes, and the wiping of data.

Gostev said that there are tens of scenarios that all end up with the same impact, which is the loss of influence, reputation and money.

Boaz Fischer's curator insight, December 30, 2014 8:39 AM

first comment

Scooped by Matthew *Matt Warren
Scoop.it!

North Korea Doubles Size of Cyber Force - The Diplomat

North Korea Doubles Size of Cyber Force - The Diplomat | Computer Ethics and Information Security | Scoop.it
North Korea has nearly doubled the size of its Strategic Cyber Command over the last two years.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Are you safe in the Internet of Things?

Are you safe in the Internet of Things? | Computer Ethics and Information Security | Scoop.it
So where are you vulnerable? A better question might be where are you NOT vulnerable?
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Google Glass is not dead, says Eric Schmidt | ET CIO

Google Glass is not dead, says Eric Schmidt | ET CIO | Computer Ethics and Information Security | Scoop.it
Eric Schmidt has said that the technology behind Glass is "too important to throw away" and that the program is being made ready for users...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Cybersecurity in the age of Terror and Foreign Adversary Aggression

Cybersecurity in the age of Terror and Foreign Adversary Aggression | Computer Ethics and Information Security | Scoop.it
One could argue that Cybersecurity is by far the most important Homeland Security, National Security and Public safety issue of our time.
more...
No comment yet.
Rescooped by Matthew *Matt Warren from What used to be conspiracy theory
Scoop.it!

Beware: Google Docs Phishing Emails are circulating - Cyberwarzone

Beware: Google Docs Phishing Emails are circulating - Cyberwarzone | Computer Ethics and Information Security | Scoop.it
Google Docs Phishing Emails are used by cybercriminals and hackers to obtain credentials from unaware Google Docs users. Learn more about these attacks.

Via Marianne PokeBunny Lenaerts
more...
Scooped by Matthew *Matt Warren
Scoop.it!

Cyber-attacks become top business continuity threat - Computer Business Review

Cyber-attacks become top business continuity threat - Computer Business Review | Computer Ethics and Information Security | Scoop.it
Hackers are worrying continuity managers more than other dangers.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Why Cyber Security Is All About The Right Hires - Lifehacker Australia

Why Cyber Security Is All About The Right Hires - Lifehacker Australia | Computer Ethics and Information Security | Scoop.it
Effective IT security requires many elements — but none is more important than training people with appropriate skills, as Nigel Phair from the ...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

PM Narendra Modi urges IT industry to develop cyber security solutions - The Times24

PM Narendra Modi urges IT industry to develop cyber security solutions - The Times24 | Computer Ethics and Information Security | Scoop.it
PM Narendra Modi urges IT industry to develop cyber security solutions
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Hacked Fridges Aren't the Internet of Things' Biggest Worry - Wired

Hacked Fridges Aren't the Internet of Things' Biggest Worry - Wired | Computer Ethics and Information Security | Scoop.it
It's not the internet-connected fridge itself that's valuable to hackers. It's the data the fridge has on you.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

The evolution of hacking - CNN

The evolution of hacking - CNN | Computer Ethics and Information Security | Scoop.it
Computer hacking was once the realm of curious teenagers. It's now the arena of government spies, professional thieves and soldiers of fortune.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Cyber threats on financial institutions

Cyber threats on financial institutions | Computer Ethics and Information Security | Scoop.it
Could we be heading towards a cyber hack that shutters our financial system?It's a scary thought, but Ben Lawsky, New York's First Superintendent of Financial Services, says our banks and insurers ...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Agencies Mold Regulations around 'Voluntary' Cyber Standards - Nextgov

Agencies Mold Regulations around 'Voluntary' Cyber Standards - Nextgov | Computer Ethics and Information Security | Scoop.it
Coast Guard, NHTSA and FDA are adapting the NIST framework for boat owners, car companies and medical device manufacturers.
more...
No comment yet.
Rescooped by Matthew *Matt Warren from SME Cyber Security
Scoop.it!

British companies at risk of becoming cyber crime-dominoes

British companies at risk of becoming cyber crime-dominoes | Computer Ethics and Information Security | Scoop.it
The ISP and hosting sectors were the most targeted industries of cyber-crime in 2014, and the trend is likely to continue in 2015.

Via Roger Smith
more...
Roger Smith's curator insight, December 11, 2014 9:18 PM

If the cyber criminals have trouble getting at a target, they will target something smaller with less security around it.   Like everyone else they are lazy, taking the easiest way out if they can