The Special Circumstances of Infosec
46 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Nicholas Sorenson
Scoop.it!

Isn't all security "through obscurity"?

Isn't all security "through obscurity"? | The Special Circumstances of Infosec | Scoop.it
I know that one shouldn't rely on "obscurity" for their security. For example, choosing a non-standard port is not really security, but it also doesn't usually hurt to do so (and may help mitigate ...
more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

7 Most Awesome Internet Trolls of All Times

7 Most Awesome Internet Trolls of All Times | The Special Circumstances of Infosec | Scoop.it
There have been endless examples of trolling, since the earliest days of the web. Here are seven of them that are some of the best of all time
more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

The geek/nerd divide: This time, it's personal - GeekWire

The geek/nerd divide: This time, it's personal - GeekWire | The Special Circumstances of Infosec | Scoop.it
Let's be clear: Nerds tinker, geeks admire and acquire. It's time to finally define both and settle the greatest debate since Star Trek vs. Star Wars.
more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

Japanese researchers achieve world record cryptanalysis of next-generation cryptography

Japanese researchers achieve world record cryptanalysis of next-generation cryptography | The Special Circumstances of Infosec | Scoop.it
Fujitsu Laboratories, National Institute of Information and Communications Technology and Kyushu University jointly broke a world cryptography record with the successful cryptanalysis of a 278-digit (923-bit)-long pairing-based cryptography, which...
more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

September 2013 Cyber Attacks Statistics

September 2013 Cyber Attacks Statistics | The Special Circumstances of Infosec | Scoop.it
Even if with a small delay, it is time for the Cyber Attacks Statistics derived from the Cyber Attacks Timelines of September (Part I and Part II). As usual let us begin with the Daily Trend of Att...
more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

How To Brace for Social Media Attacks

How To Brace for Social Media Attacks | The Special Circumstances of Infosec | Scoop.it
From Kenneth Cole’s tweet during Arab Spring to the recent YouTube video of a Golden Corral chef featuring meat behind a dumpster, the Web is littered with branded stories of woe.
Nicholas Sorenson's insight:

...brand defamation etc., not cyber-attacks : )

more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

How Quantum Computers and Machine Learning Will Revolutionize Big Data - Wired Science

How Quantum Computers and Machine Learning Will Revolutionize Big Data - Wired Science | The Special Circumstances of Infosec | Scoop.it
RT @Anarchyswan: How Quantum Computers and Machine Learning Will Revolutionize Big Data http://t.co/5zy2y3dYGY #technology
more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

Blackhole Exploit Kit Author Arrested in Russia

Blackhole Exploit Kit Author Arrested in Russia | The Special Circumstances of Infosec | Scoop.it
An out-of-the-blue tweet from a Dutch researcher kicked off an unprecedented 24-hour rumor mill yesterday concerning the arrest of Paunch, a hacker allegedly behind the notorious Blackhole Exploit Kit.
more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

Enhancing Smart Grid System Processes via Philosophy of Security

Nicholas Sorenson's insight:

Will be curating an ongoing series of interesting publications around Philosophy and Information Security. A personal interest of mine.

more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

World’s first cross-platform Web browser brought back to life

World’s first cross-platform Web browser brought back to life | The Special Circumstances of Infosec | Scoop.it
Simulation of CERN's 1992 line-mode browser surfs the modern Web in all text.
more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar | Threat Level | Wired.com

NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar | Threat Level | Wired.com | The Special Circumstances of Infosec | Scoop.it
General Keith Alexander has been building a secret army capable of launching devastating cyberattacks. Now it's ready to unleash hell. (NSA Snooping Was Only the Beginning.
more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

Michigan Cyber Range to Debut SCADA Security Training ...

Michigan Cyber Range to Debut SCADA Security Training ... | The Special Circumstances of Infosec | Scoop.it
A new training regime from the Michigan Cyber Range will show IT professionals how to fight cyber-attack of systems used in hospitals, water treatment plants, energy generation stations and other locations.
more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

How to Use Traffic Analysis to Defeat TOR

How to Use Traffic Analysis to Defeat TOR | The Special Circumstances of Infosec | Scoop.it
As was mentioned by the great OTW last week, TOR, aka The Onion Router, has had its integrity attacked by the NSA. In an attempt to reduce the anonymity granted by the service, the NSA has opened a great many nodes of their own.
more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

Today's Complex Data Can Help Predict the Future's War Zones | Danger Room | Wired.com

Today's Complex Data Can Help Predict the Future's War Zones | Danger Room | Wired.com | The Special Circumstances of Infosec | Scoop.it
Researchers have created a mapping system data scientists can mine to produce forecasts, based on short- and long-term trends, that could help aid agencies prepare for crises.
more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

How Quantum Computers and Machine Learning Will Revolutionize Big Data - Wired Science

How Quantum Computers and Machine Learning Will Revolutionize Big Data - Wired Science | The Special Circumstances of Infosec | Scoop.it
more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

Why Data Artisans Are The New Data Scientists

Why Data Artisans Are The New Data Scientists | The Special Circumstances of Infosec | Scoop.it
Number aren't just numbers. They also tell stories.
more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

DOD: Hackers Breached U.S. Critical Infrastructure Control Systems -- InformationWeek

DOD: Hackers Breached U.S. Critical Infrastructure Control Systems -- InformationWeek | The Special Circumstances of Infosec | Scoop.it
Defense secretary Leon Panetta says cyberattacks against critical infrastructure at home and abroad--some of which he called the worst to date--should spark urgent action against the hacker threat.
more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

Four billion reasons why Veeva just proved verticals are the new hotness

Four billion reasons why Veeva just proved verticals are the new hotness | The Special Circumstances of Infosec | Scoop.it
For enterprise software nerds like me, little-known and newly public Veeva might be the Dos Equis Man of startups: It may be the most interesting software company in the world. I don't always build...
more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

Reverse Engineering a D-Link Backdoor

Reverse Engineering a D-Link Backdoor | The Special Circumstances of Infosec | Scoop.it
Here’s one true hack (Google cache link) for our dear Hackaday readers. On a Saturday night, as [Craig] didn’t have anything else to do, he decided to download the firmware of an old D-Link DIR-100 router (because who wouldn’t?
more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

Hackers turn US health services site into online Ugg boots store - Naked Security

Hackers turn US health services site into online Ugg boots store - Naked Security | The Special Circumstances of Infosec | Scoop.it
Hackers turn US health services site into online Ugg boots store Naked Security Image of Ugg boots courtesy of Flickr user marie-II under Creative Commons license For at least the past two months, scammers have been hawking football shirts, Ugg...
more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

IT's control freak security mentality is starting to unravel - ZDNet

IT's control freak security mentality is starting to unravel - ZDNet | The Special Circumstances of Infosec | Scoop.it
IT's control freak security mentality is starting to unravel
ZDNet
"In fact information security was never about device lockdown, or dictating applications or building firewalls.
more...
No comment yet.
Rescooped by Nicholas Sorenson from Invincea's "The Cyber Intelligencer"- Info Sec News
Scoop.it!

7 sneak attacks used by today's most devious hackers

7 sneak attacks used by today's most devious hackers | The Special Circumstances of Infosec | Scoop.it
Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users (7 sneak attacks .. Most malware is mundane, but these innovative techniques ...

Via Invincea
more...
No comment yet.
Scooped by Nicholas Sorenson
Scoop.it!

Iranian cyber warfare commander shot dead in suspected assassination - Telegraph

Iranian cyber warfare commander shot dead in suspected assassination  - Telegraph | The Special Circumstances of Infosec | Scoop.it
The head of Iran’s cyber warfare programme has been shot dead, triggering further accusations that outside powers are carrying out targeted assassinations of key figures in the country’s security apparatus.
more...
No comment yet.
Rescooped by Nicholas Sorenson from Surfing the Broadband Bit Stream
Scoop.it!

DARPA wants computers that fuse with higher human brain function | NetworkWorld.com

DARPA wants computers that fuse with higher human brain function | NetworkWorld.com | The Special Circumstances of Infosec | Scoop.it

In the never-ending quest to get computers to process, really understand and actually reason, scientists at Defense Advanced Research Projects Agency want to look more deeply into how computers can mimic a key portion of our brain.

 

The military's advanced research group recently put out a call, or Request For information, on how it could develop systems that go beyond machine learning, Bayesian techniques, and graphical technology to solve "extraordinarily difficult recognition problems in real-time."


Current systems offer partial solutions to this problem, but are limited in their ability to efficiently scale to larger more complex datasets, DARPA said.  "They are also compute intensive, exhibit limited parallelism, require high precision arithmetic, and, in most cases, do not account for temporal data. "

 

What DARPA is interested in is looking at mimicking a portion of the brain known as the  neocortex which is utilized in higher brain functions such as sensory perception, motor commands, spatial reasoning, conscious thought and language. Specfically, DARPA said it is looking for information that provides new concepts and technologies for developing what it calls a "Cortical Processor" based on Hierarchical Temporal Memory.

 

Click headline to read more--


Via Chuck Sherwood, Senior Associate, TeleDimensions, Inc
more...
No comment yet.