While the Internet has given us the ability to run down the answer to almost any question, cybersecurity is a realm where past myth and future hype often weave together, obscuring what actually has happened and where we really are now. If we ever want to get anything effective done in securing the online world, we have to demystify it first.
Few are disputing the growth of connected devices of all kinds -- from office equipment to smartdust -- will be historic. But will it be critical to the survival and growth of the enterprise?
The extent to which hackers think up elaborate schemes to win people's trust online never ceases to amaze. The latest ones to be so bold are a crew of Iranian hackers who won the trust of American leaders by building a fake news site, along with phony social media profiles for all its fake writers.And it worked.
Privacy International warns that various PC components could retain data, raising concerns over recycled IT kit.
Joerg Asma's insight:
Most people trust devices they believe to know: their keyboards, computer mouse, telephone. But MS makes it easy with the device driver model to infiltrate those devices and plug in tons of other devices.
How can whistleblowers and journalists protect themselves from casual snooping by security agencies? A new secure whistleblowing site offers some answers to the challenge of providing better security for media sources.
Recorded Future published a report to show that members of Al-Qaeda are developing a series of new encryption software in response to NSA surveillance.
Introduction: Statistics 2013 may be remembered as the "year of the retailer breach". This statement was reported in the last Verizon Data Breach Investiga
Some of the largest US companies are looking to hire cyber-security experts in newly elevated positions and bring technologists on to their boards, a sign that corporate America is increasingly worried about hacking threats.
Joerg Asma's insight:
That is interesting. I only know very few companies in Europe, being willing to pay like that
Losing control of more than a hundred million customers’ information is an increasingly common corporate crisis. Flubbing the public revelation of that breach and failing to tell most of your customers represents a more special form of train wreck.
Joerg Asma's insight:
As an ebay customer I fully agree with this statement. Meantime between publishing in press and response by ebay to me as client could have caused significant losses in my account. That's worse!
Microsoft Security Essential Antivirus found Ancient 'STONED' Virus in Bitcoin Blockchain.
Joerg Asma's insight:
This again raises the question what Bitcoin is and what it is not?
Some people (including me) cannot resist to believe that it is a croudsourced rainbow table generation work. Can anyone proove that it our calculations we are doing is not dealing with this issue?
Sharing your scoops to your social media accounts is a must to distribute your curated content. Not only will it drive traffic and leads through your content, but it will help show your expertise with your followers.
How to integrate my topics' content to my website?
Integrating your curated content to your website or blog will allow you to increase your website visitors’ engagement, boost SEO and acquire new visitors. By redirecting your social media traffic to your website, Scoop.it will also help you generate more qualified traffic and leads from your curation work.
Distributing your curated content through a newsletter is a great way to nurture and engage your email subscribers will developing your traffic and visibility.
Creating engaging newsletters with your curated content is really easy.
To get content containing either thought or leadership enter:
To get content containing both thought and leadership enter:
To get content containing the expression thought leadership enter:
You can enter several keywords and you can refine them whenever you want. Our suggestion engine uses more signals but entering a few keywords here will rapidly give you great content to curate.