Thursday, May 29, 2014

What To Do If Your iPhone Is Hacked And Remotely Locked : All Tech Considered : NPR

Iranian Hackers Stalked U.S. Officials, Report Says - Bloomberg

Scientists achieve reliable quantum teleportation for first time Einstein is wrong? That's the potential outcome of a quantum mechanics study as scientists race to disprove his views on entanglement.

Sent from my iPhone

Edward Snowden responds to release of e-mail by U.S. officials - The Washington Post

Estonia exercise shows NATO's growing worry about cyber attacks | Science & Technology | Worldbulletin News

Friday, May 23, 2014

The biggest ever cyber attacks and security breaches - Telegraph

Wednesday, May 21, 2014

Car-Hacking Goes Viral In London - Forbes

Dozens of Arrests in 'Blackshades' Hacking Around the World - ABC News

Alleged Chinese Hacking: Alcoa Breach Relied on Simple Phishing Scam -

Military acquisition rules hamper U.S. ability to counter cyber threats

Hackers ramp up computer attacks that demand 'ransom'

Monday, May 19, 2014

Chinese military officers charged with hacking U.S. Steel, Allegheny Technologies, Westinghouse - Pittsburgh Business Times

Dozens of Arrests in 'Blackshades' Hacking Around the World - ABC News

Lockheed Martin says cyber attacks swell - Computer Business Review

Hackers ramp up computer attacks that demand 'ransom'

Sunday, May 18, 2014


Cyber crime and serious consequences result from the unfettered power gifted to hackers and malware by general purpose computers. Rampant cyber crime and malware is debilitating. This threat and uncertainty limits progress. It is the unpleasant consequence of undetected digital trespass that is actually authorized by the shortcomings of general purpose computers 
Dangerous default privileges are granted that allow malware to interfere and spy, steal and cause deliberately targeted harm. It is the result of over exposed data in a dangerous digital framework where authority and boundaries overlap. When data is left naked as a shared binary image, malware takes easy advantage
Crafted cyber attacks enter through cracks in security to exploit time shared digital space. This harms the most vital machines of modern cyber society. To solve the problem, computers should guarantee digital integrity by limiting digital authority based on need, following a POLA mantra
When the natural form of programs and data coincide with native functionality critical membranes separate private assets and innately protect each independent digital organs of activity. A typed computer guards these organs as natural, safely embedded objects in a body of software. This removes the voids and cracks of unnatural space that lead to undetected infection and ensuing criminal activity in general purpose computers 
A typed computer is the antithesis of a general purpose computer. It is technology hardened and easily programmed. It needs no operating system. It uses no privileged modes. It has no default power. It is a direct drive solution with private peer to peer communication. It shares namespace addressing across a network. It is reprogrammed in real time, on-the-fly, call by call, domain by domain. This solves the problem of deterministic memory-safety and enables click-safe usability. 
The individual citizens and the unattended control systems of cyber society could be automatically protected by typed computers but is there time and is there a will to change?
Ken Hamer-Hodges

Exclusive: Meet the Fed's First Line of Defense Against Cyber Attacks