Computer Ethics a...
Follow
Find
386 views | +0 today
 
Rescooped by Matthew *Matt Warren from High Technology Threat Brief (HTTB) (1)
onto Computer Ethics and Information Security
Scoop.it!

Infosecurity - How to Turn a Potential Insider Threat into an Information Security Asset

Infosecurity - How to Turn a Potential Insider Threat into an Information Security Asset | Computer Ethics and Information Security | Scoop.it
The right strategy for protecting your data and systems from malicious code and malicious people has always required the right blend of technological and human factors.

Via Daniel A. Libby, CFC
more...
No comment yet.
Computer Ethics and Information Security
Bring together information on computer ethics
Your new post is loading...
Your new post is loading...
Scooped by Matthew *Matt Warren
Scoop.it!

NATO nations 'will respond to a Cyber attack on one as though it were on all' - Register

NATO nations 'will respond to a Cyber attack on one as though it were on all' - Register | Computer Ethics and Information Security | Scoop.it
BBC News NATO nations 'will respond to a Cyber attack on one as though it were on all' Register NATO is set to agree a new cyber defence policy that would mean any severe cyber attack on a NATO member could be considered tantamount to a traditional...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Apple Confirms iCloud Breach in Celebrity Hacking Scandal News

Almost a week after the news of one of the largest celebrity selfie scandals first hit the frontpage of every newspaper in the country , Apple has come forward to confirm that the source of several packs of photos were in fact the company’s popular cloud hosting service, iCloud. After dozens of h... Apple, Breach, Celebrity, Confirms, Hacking, iCloud, Scandal http://gratiswebapps.blogmal.com/apple-confirms-icloud-breach-in-celebrity-hacking-scandal/
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Singapore boosts cyber security after hacking incidents - Phys.Org

Singapore boosts cyber security after hacking incidents - Phys.Org | Computer Ethics and Information Security | Scoop.it
Phys.Org Singapore boosts cyber security after hacking incidents Phys.Org The rash of attacks late last year took place after a self-proclaimed spokesperson for international hacker group Anonymous appeared in a video to demand the scrapping of a...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

The Next Battleground In The War Against Quantum Hacking | MIT Technology Review

The Next Battleground In The War Against Quantum Hacking | MIT Technology Review | Computer Ethics and Information Security | Scoop.it
Ever since the first hack of a commercial quantum cryptography device, security specialists have been fighting back. Here’s an update on the battle.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Kaspersky revealed that Stuxnet Exploits is still used worldwide

Kaspersky revealed that Stuxnet Exploits is still used worldwide | Computer Ethics and Information Security | Scoop.it
Experts at Kaspersky discovered that Stuxnet exploits targeting a Windows Shell Vulnerability is still largely used in cyber attacks.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Cybersecurity study says 36% of Canadian businesses know they've been hit by ... - Financial Post

Cybersecurity study says 36% of Canadian businesses know they've been hit by ... - Financial Post | Computer Ethics and Information Security | Scoop.it
Financial Post
Cybersecurity study says 36% of Canadian businesses know they've been hit by ...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Data from 4.5m U.S. hospital patients stolen in cyber attack from China

Data from 4.5m U.S. hospital patients stolen in cyber attack from China | Computer Ethics and Information Security | Scoop.it

AmericasData from 4.5m U.S. hospital patients stolen in cyber attack from ChinaOne of the biggest U.S. hospital operators, Community Health Systems Inc, said it suspected personal data of about 4.5...

more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Hacker claims commercial flights at risk for cyber attacks - Tech Times

Hacker claims commercial flights at risk for cyber attacks - Tech Times | Computer Ethics and Information Security | Scoop.it
Tech Times Hacker claims commercial flights at risk for cyber attacks Tech Times Not all hackers are the bad guys - for example, wearing the white techno-hat is Ruben Santamarta, a cyber security researcher who consults for cyber security firm...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Building a holistic cyber security framework - the ISACA guide - Information Age

Building a holistic cyber security framework - the ISACA guide - Information Age | Computer Ethics and Information Security | Scoop.it
Building a holistic cyber security framework - the ISACA guide Information Age To understand the present cybersecurity landscape, ISACA studies APTs in relation to previous types of threats.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Attacks to compromise TOR Network and De-Anonymize users

Attacks to compromise TOR Network and De-Anonymize users | Computer Ethics and Information Security | Scoop.it
On July 4 2014 Tor Team discovered a group of malicious relays that they assume were trying to deanonymize Tor Network users with confirmation attack.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Cyber handbook provides critical link between DHS, industry - FederalNewsRadio.com

Cyber handbook provides critical link between DHS, industry - FederalNewsRadio.com | Computer Ethics and Information Security | Scoop.it
Cyber handbook provides critical link between DHS, industry FederalNewsRadio.com The handbook is the first private sector resource to be featured on US-CERT's "Getting Started for Business" website, as part of the Critical Infrastructure Cyber...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Cybersecurity Report Recommends Path to Professional Standards ...

Cybersecurity Report Recommends Path to Professional Standards ... | Computer Ethics and Information Security | Scoop.it
“There is a widening gap between the supply and demand of qualified cybersecurity professionals,” said Spidalieri. “As schools and training institutes proliferate to meet that need, basic standards are needed to assure that ...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

The UK’s SMEs are ‘woefully under-prepared’ for cyber-attack claims Kaspersky Lab - Krypsys

The UK’s SMEs are ‘woefully under-prepared’ for cyber-attack claims Kaspersky Lab - Krypsys | Computer Ethics and Information Security | Scoop.it
How well-prepared are Britain’s small business for cyber-threat?
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Critical Security Vulnerability Found in WordPress Slider Revolution Plugin, Immediate Update Advised

Critical Security Vulnerability Found in WordPress Slider Revolution Plugin, Immediate Update Advised | Computer Ethics and Information Security | Scoop.it
The security team at Sucuri publicized a critical vulnerability found in the WordPress Slider Revolution plugin recently. The bug has since been patched, but the development team for Slider Revolut...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Banks to meet with Treasury Department on cyber threats: sources - Reuters

Banks to meet with Treasury Department on cyber threats: sources Reuters Bankers and government officials say they want to figure out ways law enforcement can alert financial firms about cyber attacks without violating the privacy of businesses...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Feds issue bulletin warning about malicious 'Google dorking' cyber actors - Computerworld

Feds issue bulletin warning about malicious 'Google dorking' cyber actors - Computerworld | Computer Ethics and Information Security | Scoop.it
Feds issue bulletin warning about malicious 'Google dorking' cyber actors
Computerworld
If you are good at research by using Google searches, does that make you a malicious cyber actor?
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Rwanda embarks on curbing cyber crimes

Rwanda embarks on curbing cyber crimes | Computer Ethics and Information Security | Scoop.it
RDB committed to combating #cybercrime http://t.co/tOCFUFTQ3l #Rwanda
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Hospital hacking of 4.5 million names includes patients of two metro-east ... - Belleville News Democrat

Hospital hacking of 4.5 million names includes patients of two metro-east ... - Belleville News Democrat | Computer Ethics and Information Security | Scoop.it
Belleville News Democrat
Hospital hacking of 4.5 million names includes patients of two metro-east ...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Sharks are Attacking the Internet!

Google needs to reinforce 100000 miles of their underwater fibre-optic cables because sharks are attracted to the cable's magnetic fields and are biting them as a result. Buy some awesomeness...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Insurance 101 - Cyber Security and Your Small Business

Today's businesses rely on technology to succeed. Unfortunately with the increased conveniences of technology, comes increased risk. Watch our video to learn how to protect your small business...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

House quietly passes three Cybersecurity Bills

The bills are aimed at enhancing cybersecurity efforts of DHS.... Website: activistpost.com Source credit: activistpost.com Image credit: belongs to their respective owner(s) and not to me......
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

How Hackers Hack: the Six Steps to Successful Hacking - Chinatopix

How Hackers Hack: the Six Steps to Successful Hacking - Chinatopix | Computer Ethics and Information Security | Scoop.it
How Hackers Hack: the Six Steps to Successful Hacking
Chinatopix
The hacker won't visit the target site when doing passive reconnaissance.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Hedge funds face true cyber-risks - Risk.net

Hedge funds face true cyber-risks - Risk.net | Computer Ethics and Information Security | Scoop.it
Hedge funds face true cyber-risks Risk.net The falsified attack – apparently invented by a BAE employee who has now left the company (see box) - brings to light the problem that the same cyber-security companies that describe the risks of being...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

National Cyber Security Awareness Month 2014 | Homeland Security

National Cyber Security Awareness Month 2014 | Homeland Security | Computer Ethics and Information Security | Scoop.it
The cyber threat has become one of the most serious economic and national security challenges we face. America’s competitiveness and economic prosperity in the 21st century will depend on effective cybersecurity. Every Internet user has a role to play in securing cyberspace and ensuring the safety of ourselves, our families, and our communities online. Learn more: - http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

The Top 5 Most Brutal Cyber Attacks Of 2014 So Far

The Top 5 Most Brutal Cyber Attacks Of 2014 So Far | Computer Ethics and Information Security | Scoop.it
In 2014, cyber attacks and data breaches don’t look like they’re going to slow down. We’ve seen high-end data breaches of large companies, with data, personal records and financial information stolen and sold on the black market in a matter of days.
more...
No comment yet.