Gentlemachines
Follow
Find tag "cybersecurity"
2.7K views | +0 today
Gentlemachines
What's new at the crossroads of culture, technology and science
Curated by Artur Alves
Your new post is loading...
Your new post is loading...
Scooped by Artur Alves
Scoop.it!

Last chance for European Parliament Cyber-Security negotiations? (video)

Last chance for European Parliament Cyber-Security negotiations? (video) | Gentlemachines | Scoop.it
Cyber-crime is a growing threat to information networks and the global economy. But would Member State collaboration limit or increase risks of attacks? We ask MEP Andreas Schwab.
Artur Alves's insight:

An EuroparlTV interview with MEP Andreas Schwab.

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

Edward Snowden Interview: The NSA and Its Willing Helpers - SPIEGEL ONLINE

Edward Snowden Interview: The NSA and Its Willing Helpers - SPIEGEL ONLINE | Gentlemachines | Scoop.it
In an interview conducted using encrypted e-mails, whistleblower Edward Snowden discusses the power of the NSA, how it is "in bed together with the Germans" and the vast scope of Internet spying conducted by the United States and Britain.
Artur Alves's insight:

Yet another confirmation.

"Interviewer: Did the NSA help to create Stuxnet? (Stuxnet is the computer worm that was deployed against the Iranian nuclear program.)

Snowden: NSA and Israel co-wrote it."

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

Cyber Intelligence Sharing and Protection Act - what is it?

Cyber Intelligence Sharing and Protection Act - what is it? | Gentlemachines | Scoop.it
Artur Alves's insight:

CISPA is back on the table. A summary of CISPA, its provisions, consequences and supporters.

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

Hackers launch assault on Israeli government websites

Hackers launch assault on Israeli government websites | Gentlemachines | Scoop.it

"Israeli officials count 44 million attacks on government sites since bombardment of Gaza began – but only one succeeds...

Cyber-attacks launched following the start of the Israeli offensive knocked some sites offline for a short period of time at the end of last week and resulted in others being defaced with pro-Palestinian messages.

Anonymous said on Saturday that it had taken down or erased the databases of nearly 700 Israeli private and public websites, including that of the Bank of Jerusalem finance house."

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

Microsoft Update and The Nightmare Scenario - F-Secure Weblog : News from the Lab

Microsoft Update and The Nightmare Scenario - F-Secure Weblog : News from the Lab | Gentlemachines | Scoop.it

Mikko Hypponen on Flame:
"Having a Microsoft code signing certificate is the Holy Grail of malware writers. This has now happened."

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

Digital Dao: Cyber Self Defense For Non-Geeks

"If someone wants to attack you, we want that person to know that it’s going to cost them something—and that may be enough to get them to leave you alone and pursue weaker, less prepared prey.

- Develop a healthy paranoia about everything in your Inbox or your Browser

- Use the most secure Web browser that you can find

- Do preventative maintenance on your computer

- Avoid free Wi-Fi

- Don’t use USB thumb drives or other removable media"

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)

The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say) | Gentlemachines | Scoop.it

"Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks."

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

Silent Circle claims major companies not declaring data breaches

Silent Circle claims major companies not declaring data breaches | Gentlemachines | Scoop.it
Secure communications providers Silent Circle claim corporate customers have admitted regular data breaches
Artur Alves's insight:

"

“Customers of ours disclose that they’re being breached, weekly, and they don’t disclose it to shareholders.”

That revelation comes against the background of a major investigation by security website Krebs on Security which revealed that some of America’s biggest data broker firms may have been unwittingly compromised.

SSNDOB is a site trading stolen personal information and achieved notoriety after leaking the Social Security numbers for celebrities like Jay Z and Michelle Obama.

Krebs found that “the miscreants behind this ID theft service controlled at least five infected systems at different US-based consumer and business data aggregators,” including Dun & Bradstreet, Kroll Background America, and LexisNexis.

"

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

How Hackers Steal Trade Secrets By Targeting Smaller Companies

How Hackers Steal Trade Secrets By Targeting Smaller Companies | Gentlemachines | Scoop.it
Verizon's annual data breach investigation finds that Chinese hackers are going after small organizations in order to steal the trade secrets of their larger partners.
Artur Alves's insight:

"Discovering data breaches was not easy for most organizations. Verizon found that the time from compromise to discovery took months, and sometimes years.

Verizon worked with 18 organizations worldwide in gathering data for the report. The groups included national computer emergency response teams and law enforcement agencies."

 

Interestingly, some easy steps can drastically improve information security, so it is up to the companies to reinforce info security literacy in order to avoid social engineering and brute force attacks.

 

"No one found any cutting-edge methods used by attackers to break into networks, so organizations can go a long ways toward protecting themselves by focusing on the basics, such as stronger passwords and educating employees about bogus email."

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

Hackers call US government's latest cybersecurity efforts 'a train wreck'

Hackers call US government's latest cybersecurity efforts 'a train wreck' | Gentlemachines | Scoop.it
As Congress gears up to debate Cispa again, Anonymous threatens to shut down stream of Obama's state of the union
Artur Alves's insight:

Defending is, shall we say, not as easy as attacking...

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

US National Security Agency boss asks hackers to make internet more secure

US National Security Agency boss asks hackers to make internet more secure | Gentlemachines | Scoop.it
General Keith Alexander stresses common ground between US officials and hackers at Def Con gathering in Las Vegas...
more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

How Obama Was Dangerously Naive About STUXNET and Cyberwarfare - Technology Review

"A Times exposé suggests that the White House failed to consider how our own cyberweapons would be used against us.

Then, in Summer 2010, an event the administration should have anticipated occurred: The STUXNET worm got loose and started replicating outside the Iranian enrichment plant that had been its target. In the wild, on the Internet, its was exposed for everyone to see.

1. Proliferation of STUXNET code, with unknown targets.

2. “Industrial-grade” control system malware almost revealed at a Dallas information security conference.

3. Industrial Control System hacking "toolkit" released.

4. STUXNET code showed up in an "indestructible" zombie botnet that has infected millions of PCs."

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

Militarisation of cyberspace: how the global power struggle moved online

Militarisation of cyberspace: how the global power struggle moved online | Gentlemachines | Scoop.it

Rise of cyber-attacks on critical infrastructure on both sides of Atlantic calls for creation of cyberweapons and new rules for use

more...
No comment yet.