Computer Ethics a...
Follow
Find
229 views | +1 today
Scooped by Matthew *Matt Warren
onto Computer Ethics and Information Security
Scoop.it!

Java users beware: Exploit circulating for just-patched critical flaw

Java users beware: Exploit circulating for just-patched critical flaw | Computer Ethics and Information Security | Scoop.it
If you haven't installed last week's Java update, now would be a good time.
more...
No comment yet.
Computer Ethics and Information Security
Bring together information on computer ethics
Your new post is loading...
Scooped by Matthew *Matt Warren
Scoop.it!

Our children are spending a lot of their time in cyberspace – we have to make ... - Irish Independent

Our children are spending a lot of their time in cyberspace – we have to make ... - Irish Independent | Computer Ethics and Information Security | Scoop.it
Irish Independent
Our children are spending a lot of their time in cyberspace – we have to make ...
Irish Independent
For example, a recent UK report highlighted that 28pc of three to four-year-olds now use tablet computers.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Andrew Rose: why security should be a 'Board Level' discussion

Andrew Rose, Principal Analyst Security and Risk, Forrester Research, Inc., shares his opinions on why security should be a 'Board Level' discussion; the imp...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Web Exclusive: The NIST Cybersecurity Framework - InTech

Web Exclusive: The NIST Cybersecurity Framework - InTech | Computer Ethics and Information Security | Scoop.it
Web Exclusive: The NIST Cybersecurity Framework InTech On 12 February 2013 President Obama issued Executive Order 13636, titled "Improving Critical Infrastructure Cybersecurity." The executive order instructed the National Institute of Standards...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Security expert on MH370: Cyber threats a possibility

Security expert on MH370: Cyber threats a possibility | Computer Ethics and Information Security | Scoop.it
A security expert says cyber attacks are an emerging threat to aviation security (On #MH370: A security expert says cyber attacks are an emerging threat to aviation security.
more...
No comment yet.
Rescooped by Matthew *Matt Warren from Information Security
Scoop.it!

The Scrap Value of a Hacked PC, Revisited — Krebs on Security

The Scrap Value of a Hacked PC, Revisited — Krebs on Security | Computer Ethics and Information Security | Scoop.it
Brian Krebs at "Krebs on Security" ..."put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer user who can’t begin to fathom why miscreants would want to hack into his PC. “I don’t bank online, I don’t store sensitive information on my machine! I only use it to check email. What could hackers possibly want with this hunk of junk?,” are all common refrains from this type of user.I recently updated the graphic (below) to include some of the increasingly prevalent malicious uses for hacked PCs, including hostage attacks — such as ransomware — and reputation hijacking on social networking forums.
Via Paul Misner
more...
No comment yet.
Rescooped by Matthew *Matt Warren from Internet and Cybercrime
Scoop.it!

UK's web filtering seems to be blocking common sense - Index On Censorship

UK's web filtering seems to be blocking common sense - Index On Censorship | Computer Ethics and Information Security | Scoop.it
“ Index On Censorship UK's web filtering seems to be blocking common sense Index On Censorship Whereas Britain, by imposing all these controls, is growing a generation that knows how to evade internet control.”
Via David Silva Ramalho
more...
No comment yet.
Rescooped by Matthew *Matt Warren from Internet and Cybercrime
Scoop.it!

The Mt Gox bitcoin scandal is the best thing to happen to bitcoin in years

The Mt Gox bitcoin scandal is the best thing to happen to bitcoin in years | Computer Ethics and Information Security | Scoop.it
“ After its biggest exchange’s collapse, Bitcoin could shed its shady reputation and start anew as believable currencyHeidi Moore”
Via David Silva Ramalho
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

EUROPA - PRESS RELEASES - Press release - Great news for cyber security in the EU: The EP successfully votes through the Network & Information Security (NIS) directive

EUROPA - PRESS RELEASES - Press release - Great news for cyber security in the EU: The EP successfully votes through the Network & Information Security (NIS) directive | Computer Ethics and Information Security | Scoop.it
European Commission - Press Release details page - European Commission Statement Brussels, 13 March 2014 Following the successful vote* on the NIS directive on cyber security today in Strasbourg, Vice President Neelie Kroes said: This vote today is...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Report: Over 2 mln Romanian IPs involved in cyber security incidents in 2013 - Romania-Insider.com

Report: Over 2 mln Romanian IPs involved in cyber security incidents in 2013 - Romania-Insider.com | Computer Ethics and Information Security | Scoop.it
Romania-Insider.com Report: Over 2 mln Romanian IPs involved in cyber security incidents in 2013 Romania-Insider.com The Romanian National Computer Security Incident Response Team CERT-RO received in 2013 over 43 cyber security alerts, and found...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Turkey's Leaders Spar Over Plan to Muzzle Social Media - New York Times

Turkey's Leaders Spar Over Plan to Muzzle Social Media - New York Times | Computer Ethics and Information Security | Scoop.it
Aljazeera.com Turkey's Leaders Spar Over Plan to Muzzle Social Media New York Times Prime Minister Recep Tayyip Erdogan vowed Thursday night to restrict social media after local elections this month, despite harsh reactions worldwide to a crackdown...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Cyber-Security Creates New Pressures for IT Pros - Baseline

Cyber-Security Creates New Pressures for IT Pros - Baseline | Computer Ethics and Information Security | Scoop.it
Baseline Cyber-Security Creates New Pressures for IT Pros Baseline Seemingly overnight, cyber-security has evolved from an important enterprise function into a mission-critical issue that affects almost every aspect of business and information...
more...
No comment yet.
Rescooped by Matthew *Matt Warren from ITSecurity
Scoop.it!

Egypt catches divers cutting Internet cable amid disruptions


Via sachin
more...
No comment yet.
Rescooped by Matthew *Matt Warren from Internet and Cybercrime
Scoop.it!

Europol nabs cyber crooks behind 21,000-strong hacked server store

Europol nabs cyber crooks behind 21,000-strong hacked server store | Computer Ethics and Information Security | Scoop.it
Cyber black market tool processing €10,000 per day (#Europol nabs #cyber crooks behind 21,000-strong hacked server store http://t.co/4lHJ2zrfOH #cybercrime)...

Via David Silva Ramalho
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Miners and the Need to be Mindful of Cyber-Security | Emerson ...

Miners and the Need to be Mindful of Cyber-Security | Emerson ... | Computer Ethics and Information Security | Scoop.it
OT systems are less secure and are less prone to attack. IT systems, despite their enhanced security, are more frequently targets of cyber-attacks. Combining both onto one platform could make the overall system more ...
more...
No comment yet.
Suggested by Jim LeFleur
Scoop.it!

Understanding the Heartbleed Bug

Understanding the Heartbleed Bug | Computer Ethics and Information Security | Scoop.it
Probably the easiest-to-understand explanation you can find about the wildly and dangerously popular heartbleed bug.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Businesses scramble to upgrade computers as support for Windows XP ends Tuesday

Businesses scramble to upgrade computers as support for Windows XP ends Tuesday | Computer Ethics and Information Security | Scoop.it
With security support for Microsoft's venerable Windows XP operating system ending Tuesday, businesses are scrambling to secure from threats the huge number of computers that run on the 12-year-old platform.
more...
No comment yet.
Rescooped by Matthew *Matt Warren from Information Security
Scoop.it!

Microsoft Security Essentials Will Have Warnings for Windows XP Users

Microsoft Security Essentials Will Have Warnings for Windows XP Users | Computer Ethics and Information Security | Scoop.it
“The next Microsoft Security Essentials release, version 4.5, will feature prominent warnings for Windows XP users.”
Via Paul Misner
more...
No comment yet.
Rescooped by Matthew *Matt Warren from Information Security
Scoop.it!

Virus compromises sensitive info on 5,400 Colorado hospital patients

Virus compromises sensitive info on 5,400 Colorado hospital patients | Computer Ethics and Information Security | Scoop.it
“Social Security numbers and payment card data is among the personal information that may have been compromised for about 5,400 Colorado patients after a computer virus was identified on some hospital computers.”
Via Paul Misner
more...
No comment yet.
Rescooped by Matthew *Matt Warren from Internet and Cybercrime
Scoop.it!

North Korea: Where the Internet has just 5500 sites - Toronto Star

North Korea: Where the Internet has just 5500 sites - Toronto Star | Computer Ethics and Information Security | Scoop.it
“ Toronto Star North Korea: Where the Internet has just 5500 sites Toronto Star North Korea is off the charts regarding Internet freedoms. There essentially aren't any. But the country is increasingly online.”
Via David Silva Ramalho
more...
No comment yet.
Rescooped by Matthew *Matt Warren from Internet and Cybercrime
Scoop.it!

New cyber crimes law ignores many aspects - The News International

New cyber crimes law ignores many aspects - The News International | Computer Ethics and Information Security | Scoop.it
“ The News International New cyber crimes law ignores many aspects The News International Sources in the National Response Centre for Cyber Crimes (NR3C) told The News that international companies like Google, Hotmail and others had never cooperated...”
Via David Silva Ramalho
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

New EU cybersecurity law avoids making big Internet companies report breaches - PCWorld

New EU cybersecurity law avoids making big Internet companies report breaches - PCWorld | Computer Ethics and Information Security | Scoop.it
New EU cybersecurity law avoids making big Internet companies report breaches PCWorld Europe on Thursday approved a new cybersecurity law, but held back from requiring Internet giants such as Google, Amazon, Ebay and Skype, to report security...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Cyber-Weapons' Deployment Uncertain in Ukraine, Russia Standoff

Cyber-Weapons' Deployment Uncertain in Ukraine, Russia Standoff | Computer Ethics and Information Security | Scoop.it
Russia and Ukraine have well developed cyber skills, prompting security experts to wonder to how they could come into play in the standoff between the two former Soviet bloc nations.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Cybersecurity stock valuations on the rise - CNBC.com

Cybersecurity stock valuations on the rise - CNBC.com | Computer Ethics and Information Security | Scoop.it
CNBC.com
Cybersecurity stock valuations on the rise
CNBC.com
Smart investors seem to have fallen in love with cybersecurity. And it's no wonder, given the incredible need to protect data.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Perspective: Microsoft risks security reputation ruin by retiring XP - Computerworld

Perspective: Microsoft risks security reputation ruin by retiring XP - Computerworld | Computer Ethics and Information Security | Scoop.it
SiliconANGLE (blog) Perspective: Microsoft risks security reputation ruin by retiring XP Computerworld Computerworld - A decade ago, Microsoft kicked off SDL, or Security Development Lifecycle, a now-widely-adopted process designed to bake security...
more...
No comment yet.
Rescooped by Matthew *Matt Warren from Internet and Cybercrime
Scoop.it!

7 sneak attacks used by today's most devious hackers

7 sneak attacks used by today's most devious hackers | Computer Ethics and Information Security | Scoop.it
Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

Via David Silva Ramalho
more...
No comment yet.