Computer Ethics a...
Follow
Find
321 views | +3 today
Rescooped by Matthew *Matt Warren from High Technology Threat Brief (HTTB) (1)
onto Computer Ethics and Information Security
Scoop.it!

Infosecurity - How to Turn a Potential Insider Threat into an Information Security Asset

Infosecurity - How to Turn a Potential Insider Threat into an Information Security Asset | Computer Ethics and Information Security | Scoop.it
The right strategy for protecting your data and systems from malicious code and malicious people has always required the right blend of technological and human factors.

Via Daniel A. Libby, CFC
more...
No comment yet.
Computer Ethics and Information Security
Bring together information on computer ethics
Your new post is loading...
Your new post is loading...
Scooped by Matthew *Matt Warren
Scoop.it!

Hacking experts build device to protect cars from cyber attacks - The Australian

Hacking experts build device to protect cars from cyber attacks - The Australian | Computer Ethics and Information Security | Scoop.it
Hacking experts build device to protect cars from cyber attacks The Australian Two security experts who a year ago exposed methods for hacking the Toyota Prius and Ford Escape say they have developed technology that would keep automobiles safe from...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

NSA director: Cyber attacks need international norms - Aspen Daily News

NSA director: Cyber attacks need international norms - Aspen Daily News | Computer Ethics and Information Security | Scoop.it
NSA director: Cyber attacks need international norms Aspen Daily News During Saturday's session at the Aspen Meadows campus titled “Security Challenges in the Ever-Evolving Cyber Realm,” Ledgett answered questions on the state of the NSA and the...
more...
No comment yet.
Rescooped by Matthew *Matt Warren from Digital-News on Scoop.it today
Scoop.it!

Japan cyberattacks on government sites surge

Japan cyberattacks on government sites surge | Computer Ethics and Information Security | Scoop.it
Japan has seen a surge in cases of irregular access to government computer systems and cyberattacks on operators of social infrastructure, a top official said.

Via Thomas Faltin
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Report says oil companies, other critical infrastructure still complacent on ... - SecurityInfoWatch

Report says oil companies, other critical infrastructure still complacent on ... - SecurityInfoWatch | Computer Ethics and Information Security | Scoop.it
International Business Times
Report says oil companies, other critical infrastructure still complacent on ...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Congress is overdue in dealing with the cybersecurity threat - Washington Post

Congress is overdue in dealing with the cybersecurity threat - Washington Post | Computer Ethics and Information Security | Scoop.it
Congress is overdue in dealing with the cybersecurity threat Washington Post THE INTERNET security company Symantec revealed recently that a group of hackers known as Dragonfly infiltrated malware into legitimate software belonging to three...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Special report: Cyber security – The bullseye of the storm - The Lawyer

Special report: Cyber security – The bullseye of the storm - The Lawyer | Computer Ethics and Information Security | Scoop.it
Special report: Cyber security – The bullseye of the storm
The Lawyer
Cyber security is about stopping people from breaking into things.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

UNSW students dominate Cyber Security Challenge | UNSW Newsroom

UNSW students dominate Cyber Security Challenge | UNSW Newsroom | Computer Ethics and Information Security | Scoop.it
“UNSW have claimed four of the top five places in this year's Cyber Security Challenge http://t.co/8dGjNFq4st”;
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Target CEO resignation highlights cost of security blunders

Target CEO resignation highlights cost of security blunders | Computer Ethics and Information Security | Scoop.it
The massive data breach that tarnished the career of Target Chief Executive Gregg Steinhafel and contributed to his resignation is a reminder of the worst-case scenario facing CEOs caught in a security SNAFU.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

China hires 4,000 'Porn Cops' to patrol the internet and crackdown on illicit content

Check out our official website: http://us.tomonews.net/ Check out our Android app: http://goo.gl/PtT6VD Check out our iOS app: http://bit.ly/1gO3z1f --------------------------------------------...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Policies should focus on 'managing,' not 'solving' cybersecurity problems ... - FierceGovernmentIT

Policies should focus on 'managing,' not 'solving' cybersecurity problems ... - FierceGovernmentIT | Computer Ethics and Information Security | Scoop.it
Policies should focus on 'managing,' not 'solving' cybersecurity problems ...
FierceGovernmentIT
Public policy can help address U.S. cybersecurity, but it should not be viewed as an issue that can be solved through legislation or regulation.
more...
No comment yet.
Suggested by Richard Boss
Scoop.it!

Heartbleed

Heartbleed | Computer Ethics and Information Security | Scoop.it

Do you know Heartbleed OpenSSL bug? This infographic illustrates about Heartbleed OpenSSL bug and you will learn that how to protect yourself from 'Heartbleed' OpenSSL bug. You can also find which companies have issued a security patch to fix the Heartbleed bug.

 

 

more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Miners and the Need to be Mindful of Cyber-Security | Emerson ...

Miners and the Need to be Mindful of Cyber-Security | Emerson ... | Computer Ethics and Information Security | Scoop.it
OT systems are less secure and are less prone to attack. IT systems, despite their enhanced security, are more frequently targets of cyber-attacks. Combining both onto one platform could make the overall system more ...
more...
No comment yet.
Suggested by Jim LeFleur
Scoop.it!

Understanding the Heartbleed Bug

Understanding the Heartbleed Bug | Computer Ethics and Information Security | Scoop.it
Probably the easiest-to-understand explanation you can find about the wildly and dangerously popular heartbleed bug.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

“India should be more aware of cyber security threats” - BGR India

“India should be more aware of cyber security threats” - BGR India | Computer Ethics and Information Security | Scoop.it
BGR India “India should be more aware of cyber security threats” BGR India India should be more aware of cyber security threats and the time to act in this regard is now, an Israeli security solutions firm has said even as it averred that the two...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

The enterprise password manager in a evolving world of constant cyber-threats

The enterprise password manager in a evolving world of constant cyber-threats | Computer Ethics and Information Security | Scoop.it
Cybercrime is one area where the idea of industrial development is a scary rather than an exciting thing.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

M&A deals at risk from weak cyber due diligence - PropertyCasualty360

M&A deals at risk from weak cyber due diligence - PropertyCasualty360 | Computer Ethics and Information Security | Scoop.it
PropertyCasualty360 M&A deals at risk from weak cyber due diligence PropertyCasualty360 Cyber security breaches pose a real threat to M&A deals, but companies are becoming too complacent in the assessment of cyber risk, according to a recent survey...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Military cybersecurity by the numbers - Belleville News Democrat

Military cybersecurity by the numbers - Belleville News Democrat | Computer Ethics and Information Security | Scoop.it
Military cybersecurity by the numbers
Belleville News Democrat
320: The number of new military and civilian jobs coming to Scott because of the new cybersecurity squadrons.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

The Internet Of Things: Enabler Of The Fourth Industrial Revolution

The Internet Of Things: Enabler Of The Fourth Industrial Revolution | Computer Ethics and Information Security | Scoop.it
The rapid growth of the Internet of Things will keep space design, engineering, and manufacturing at the heart of the future, but they will be transformed.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Registry Hack: Get Windows XP Security Updates until 2019

Registry Hack: Get Windows XP Security Updates until 2019 | Computer Ethics and Information Security | Scoop.it
Registry Hack allows Windows XP users to install Security Updates until 2019 from Microsoft Windows Embedded POSReady 2009.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Finland excels in cyber security review; language a deterrent - YLE News

Finland excels in cyber security review; language a deterrent - YLE News | Computer Ethics and Information Security | Scoop.it
“YLE News Finland excels in cyber security review; language a deterrent YLE News A fresh report by the software giant Microsoft places Finland among the top five locations for cyber security.”
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

5 Mistakes Cyber Security Teams Make – And how to Fix Them

5 Mistakes Cyber Security Teams Make – And how to Fix Them | Computer Ethics and Information Security | Scoop.it
Why are security operations failing? HP SOC Security Services explains what to guard against. (Don’t become the next #CyberSecurity breach victim.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

IBM's New Cybersecurity Plan: Find Bad Guys Before They Steal - Wall Street Journal (blog)

IBM's New Cybersecurity Plan: Find Bad Guys Before They Steal - Wall Street Journal (blog) | Computer Ethics and Information Security | Scoop.it
IBM's New Cybersecurity Plan: Find Bad Guys Before They Steal
Wall Street Journal (blog)
Protecting a company from data theft traditionally involves setting up a secure perimeter.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

EU, Japan to start cyber-security dialogue - Phys.Org

EU, Japan to start cyber-security dialogue - Phys.Org | Computer Ethics and Information Security | Scoop.it
Phys.Org
EU, Japan to start cyber-security dialogue
Phys.Org
Speaking ahead of Abe's arrival on Tuesday, the official said a Strategic Partnership Agreement (SPA) being negotiated with Japan would now include closer cooperation on cyber-security.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Our children are spending a lot of their time in cyberspace – we have to make ... - Irish Independent

Our children are spending a lot of their time in cyberspace – we have to make ... - Irish Independent | Computer Ethics and Information Security | Scoop.it
Irish Independent
Our children are spending a lot of their time in cyberspace – we have to make ...
Irish Independent
For example, a recent UK report highlighted that 28pc of three to four-year-olds now use tablet computers.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Andrew Rose: why security should be a 'Board Level' discussion

Andrew Rose, Principal Analyst Security and Risk, Forrester Research, Inc., shares his opinions on why security should be a 'Board Level' discussion; the imp...
more...
No comment yet.