Computer Ethics and Information Security
700 views | +0 today
Follow
 
Scooped by Matthew *Matt Warren
onto Computer Ethics and Information Security
Scoop.it!

Man who shut down Larimer County computer system sentenced - Denver Post

Man who shut down Larimer County computer system sentenced - Denver Post | Computer Ethics and Information Security | Scoop.it
Man who shut down Larimer County computer system sentenced Denver Post A man who shut down Larimer County government computers in a cyber attack that authorities believe was in retaliation for a drunk driving charge has been sentenced to 18 months...
more...
No comment yet.
Computer Ethics and Information Security
Bring together information on computer ethics
Your new post is loading...
Your new post is loading...
Scooped by Matthew *Matt Warren
Scoop.it!

Trump draws ire after urging Russia to find 'missing' Clinton emails

Trump draws ire after urging Russia to find 'missing' Clinton emails | Computer Ethics and Information Security | Scoop.it
Republican Donald Trump on Wednesday invited Russia to dig up tens of thousands of "missing" emails from Hillary Clinton's time at the U.S.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Hacking A Penetration Tester

Hacking A Penetration Tester | Computer Ethics and Information Security | Scoop.it
How even a pen test conducted by a security pro can be hacked by a determined attacker looking for a way to its target.
more...
No comment yet.
Rescooped by Matthew *Matt Warren from Learning on the Digital Frontier
Scoop.it!

Using Minecraft to teach and simulate information security scenarios

Most parents and educators who are aware of Minecraft as a way to teach programming, critical thinking, design thinking and other skills, and that it is something many students love to use. I came across a presentation by Jarred White that he has delivered at security conferences on "Threat Modeling the Minecraft Way."
He talks about this unusual application of Minecraft as a tool for threat modeling and the parallels between information security and Minecraft's game mechanics, for example, asset protection. 
There is a video online and at about 14 minutes he compares Minecraft's "threat agents" to real-world security attacks: creeper monsters are very similar to denial-of-service attacks; skeletons shooting arrows are similar to remote code execution; zombies are similar to viruses. 
That means that players can also design passive security measures, such as architectural feature that can block spiders from climbing up walls.
Not only is this approach an interesting one for younger students to examine, and perhaps will be an introduction to the next generation of security workers. It can be also used at higher levels and ages to model the basics of cybersecurity, work in 3D spaces in a real-time simulator. 

Via Bob Irving
more...
No comment yet.
Rescooped by Matthew *Matt Warren from Internet and Cybercrime
Scoop.it!

In the FBI’s Crypto War, Apps May Be the Next Target

In the FBI’s Crypto War, Apps May Be the Next Target | Computer Ethics and Information Security | Scoop.it
Beyond the FBI's fight with Apple, a wiretap order sent to WhatsApp signals a coming conflict between law enforcement and encryption app makers, too.
Via David Silva Ramalho
more...
No comment yet.
Rescooped by Matthew *Matt Warren from Internet and Cybercrime
Scoop.it!

Security News This Week: A Deluge of Mega-Breaches Dumps on the Dark Web

Security News This Week: A Deluge of Mega-Breaches Dumps on the Dark Web | Computer Ethics and Information Security | Scoop.it
Each Saturday we round up the news stories that we didn’t break or cover in depth at WIRED, but which deserve your attention nonetheless.
Via David Silva Ramalho
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Gartner picks out top ten cyber security technologies for 2016 | Information Age

Gartner picks out top ten cyber security technologies for 2016 | Information Age | Computer Ethics and Information Security | Scoop.it
Analyst firm Gartner has unveiled the leading technologies that organisations must master if they want to win the cybersecurity battle in 2016
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Anti-virus is key for cyber security on-board

Anti-virus is key for cyber security on-board | Computer Ethics and Information Security | Scoop.it
As maritime users increase their data consumption with the 21st century connect anywhere at any time culture, vessel network security is becoming ever more important as ships face a wider threat of cyber-attack and viruses.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Massive DDoS cyber attack takes down Pokémon Go

Massive DDoS cyber attack takes down Pokémon Go | Computer Ethics and Information Security | Scoop.it
News: Hacking group PoodleCorp has taken responsibility for the attack on Twitter, with further promises of a bigger attack coming soon.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

New Revelation: Clinton Knew of Blackberry Security Concerns

Newly released emails reveal Hillary Clinton was made aware of security concerns over her Blackberry when she became secretary of state.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

What the Internet of Things means for today and tomorrow

What the Internet of Things means for today and tomorrow | Computer Ethics and Information Security | Scoop.it
Find out how enterprises are evolving around the Internet of Things and some of the important considerations that come with those changes.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

BBB out with cyber security tips during Cyber Security Awareness month - 660 News

BBB out with cyber security tips during Cyber Security Awareness month - 660 News | Computer Ethics and Information Security | Scoop.it
Some helpful advice from the Better Business Bureau during Cyber Security Awareness Month, which happens to be October. The BBB is urging businesses and individuals to take precautions when backing up their computer systems.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Could big data violate the ethics of your business?

Could big data violate the ethics of your business? | Computer Ethics and Information Security | Scoop.it
News: Improper use of big data analytics will be 50% of businesses’ ethics violations by 2018.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Crime Watch: Cyber Security Awareness Month spotlights the perils of computer ... - Miami Herald

October is National cyber Security Awareness Month. This is the perfect time for everyone to review what they can do to protect their electronic devices and data from cyber threats.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

7 Ways To Charm Users Out of Their Passwords

7 Ways To Charm Users Out of Their Passwords | Computer Ethics and Information Security | Scoop.it
While the incentives have changed over time, it still takes remarkably little to get users to give up their passwords.
more...
No comment yet.
Rescooped by Matthew *Matt Warren from The Political Side of Things
Scoop.it!

Prepare to be hacked: Information security for small organizations

Prepare to be hacked: Information security for small organizations | Computer Ethics and Information Security | Scoop.it

Assume a breach will happen.


You should plan for what to do when it happens, but work as hard as you can to prevent it. This has been the failing of a number of high-profile breaches. The example given was the Ashley Madison hack; in this case, the highly sensitive information was not stored safely, was inadequately protected, and too many people had access to the backend of the system.


When the hack happened, they were caught completely flat-footed and unable to respond quickly. Their practice of never deleting stale personal information—including that of users who had left the system—compounded the problem.


There are low-cost, low-impact measures that could have been taken that would have prevented the data from getting leaked.


Via Apptimate, Ken Feltman
Matthew *Matt Warren's insight:
The smaller your business, the harder it is to recover from a breach.
more...
Apptimate's curator insight, July 5, 7:17 AM

Security is about mind-set, and secondly about technology. Understand your threats and you will save money while lowering your and you users risk.

Ken Feltman's curator insight, July 13, 9:14 AM
The smaller your business, the harder it is to recover from a breach.
Rescooped by Matthew *Matt Warren from #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps
Scoop.it!

#Security: #Password Guidance - Microsoft’s recommendations for password management

Microsoft’s recommendations for password management

Via Frederic GOUTH
more...
No comment yet.
Rescooped by Matthew *Matt Warren from Internet and Cybercrime
Scoop.it!

Even your connected car will need antivirus software

Even your connected car will need antivirus software | Computer Ethics and Information Security | Scoop.it
Connected cars can talk to each other (vehicle-to-vehicle, or V2V), and they're starting to be able to talk to the city they're driving around..
Via David Silva Ramalho
more...
No comment yet.
Rescooped by Matthew *Matt Warren from #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps
Scoop.it!

11 essential data #security tips for travelers

11 essential data #security tips for travelers | Computer Ethics and Information Security | Scoop.it
Your data and privacy are never more at risk than when you travel; here's how to protect them

Via Michel CAZENAVE, Frederic GOUTH
more...
Michel CAZENAVE's curator insight, July 8, 3:22 AM
Going abroad is not a neutral action. Some strange laws, rules and uses may occur... One have to take it into account. Data security when travelling or at custom is one of these.
Scooped by Matthew *Matt Warren
Scoop.it!

The coolest US agency is starting a ‘revolution’ to get rid of computer viruses

The coolest US agency is starting a ‘revolution’ to get rid of computer viruses | Computer Ethics and Information Security | Scoop.it
In the world of computer security, the bad guys are always 10 steps ahead of the good guys.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Asian nations mull regional 'Europol' in fight against cybercrime

Asian nations mull regional 'Europol' in fight against cybercrime | Computer Ethics and Information Security | Scoop.it
ASEAN ministers flag 'Asiapol' in closed-door talks
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Cybersecurity and Healthcare – Controls, Plans, and Board Preparation

Part 3 session objectives include: 1) Discussing key lines of defense for cybersecurity risks and 2) Identifying the cybersecurity agenda for Executiv
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

IDC: Cyber Insurance Will Be Commonplace In The Future - InformationWeek

IDC: Cyber Insurance Will Be Commonplace In The Future   - InformationWeek | Computer Ethics and Information Security | Scoop.it
IDC is advising insurers faced with a mature market to consider offering cyber insurance. Cybercrimes, it says, have cost the global economy $445 billion.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Small businesses face greater threat from computer hackers, report warns - ABC News (Australian Broadcasting Corporation)

Small businesses face greater threat from computer hackers, report warns - ABC News (Australian Broadcasting Corporation) | Computer Ethics and Information Security | Scoop.it
Small businesses are increasingly being targeted by computer hackers because their security is not as tough as larger companies, according to a Government report.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Cedric Richmond's cybersecurity bill passes House - NOLA.com

WASHINGTON – The House Tuesday (October 6) approved by voice vote Rep.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Fledgling Israeli cyber-security giant makes second acquisition - The Times of Israel

Fledgling Israeli cyber-security giant makes second acquisition - The Times of Israel | Computer Ethics and Information Security | Scoop.it
Itself a start-up, CyberArk is further expanding its footprint with the acquisition of Massachusetts-based Viewfinity
more...
No comment yet.