Posts

Ukrainian military compromised by Trojanised targeting app on soldiers' smartphones | Computing

Qubes OS plans commercial versions, team expansion

Cherokee, NC

UK rail network hit by multiple cyber attacks last year

Cyber attacks cost UK business more than £34bn a year, study shows

Google hopes cryptography will protect Chrome browsers from quantum computer attacks : Tech : Yibada

WIRED: Clever Attack Uses the Sound of a Computer’s Fan to Steal Data

Google is fighting future hackers with post-quantum cryptography

FBI Warns Nation-State Cyber Attacks Are Continuing

Fwd: Reuters: How a hacker's typo helped stop a billion dollar bank heist

Fwd: Reuters: How a hacker's typo helped stop a billion dollar bank heist

What's the point of secure software if you can't trust your CPU? - Computing. This is exactly the reason the PP 250 instruction set was built to guarantee security in hardware

Exclusive: Inside the ProtonMail siege: how two small companies fought off one of Europe's largest DDoS attacks - TechRepublic

Fwd: [cap-talk] [friam] Re: UX resources for object capabilities

Domain Shadowing - Wild West Of Internet Cyber Attacks »

EXCLUSIVE: Entire US national security system possibly compromised by year-long cyber-assault

How Hacking Team Created Spyware that Allowed the FBI To Monitor Tor Browser

Hacking Team Project X

Google Photos and the unguessable URL | The Verge

BBC News: US hit by 'massive data breach'

North Korean hackers 'could kill'

Delegation

Bug in 1,000 apps could open Apple devices to hacking - CBS News

Nearly 1 million new malware threats released every day April 14 - CNNMoney

HP Awards $240K for Firefox, IE, Chrome and Safari Exploits

Fwd: Hacking BIOS Chips Isn't Just the NSA's Domain Anymore | WIRED

Fwd: All four major browsers take a stomping at Pwn2Own hacking competition | Ars Technica

Fwd: [Caja] Understanding the difference between Google Caja and Secure ECMAScript (SES), and if SES is ready to use

PP250 Power Point Presentations

Thunderstrike MacBook malware attacks computers via Thunderbolt port | IT PRO

Fwd: [cap-talk] some capability queries

The FBI Used the Web's Favorite Hacking Tool to Unmask Tor Users | WIRED

Intel+boss'+warning+on+cyber+attacks+no+joke,+say+experts+|+Fox+News

Stealthy, sophisticated 'Regin' malware has been infecting computers since 2008 | PCWorld

Ghosts in the machine language – Elevate

Fwd: [cap-talk] A new type of phishing attack

Fwd: [Caja] Rich-text editors compatible with Caja

Do airplanes evolve like birds? - CSMonitor.com

How a bug in Windows might be costing humanity over 600 years of wasted time per day - garry's posthaven

EXECUTION ENVIRONMENTS | Hypervisor

Cyber attack on oil firms ‘could cost billions’ - Top stories - The Scotsman

About seL4 | seL4

Fwd: [cap-talk] Fwd: seL4 is going open source

What To Do If Your iPhone Is Hacked And Remotely Locked : All Tech Considered : NPR

Iranian Hackers Stalked U.S. Officials, Report Says - Bloomberg

Scientists achieve reliable quantum teleportation for first time

Edward Snowden responds to release of e-mail by U.S. officials - The Washington Post

Estonia exercise shows NATO's growing worry about cyber attacks | Science & Technology | Worldbulletin News

The biggest ever cyber attacks and security breaches - Telegraph

Car-Hacking Goes Viral In London - Forbes

Dozens of Arrests in 'Blackshades' Hacking Around the World - ABC News

Alleged Chinese Hacking: Alcoa Breach Relied on Simple Phishing Scam - WSJ.com

Military acquisition rules hamper U.S. ability to counter cyber threats

Hackers ramp up computer attacks that demand 'ransom'

Chinese military officers charged with hacking U.S. Steel, Allegheny Technologies, Westinghouse - Pittsburgh Business Times

Dozens of Arrests in 'Blackshades' Hacking Around the World - ABC News

Lockheed Martin says cyber attacks swell - Computer Business Review

Hackers ramp up computer attacks that demand 'ransom'

THE UNCERTAINTY OF GENERAL PURPOSE DIGITAL COMPUTERS

Exclusive: Meet the Fed's First Line of Defense Against Cyber Attacks

Fed_Cybersecurity_RD_Strategic_Plan_2011.pdf

Critical Security Update for Internet Explorer

Authority Based Access Control : Open Social Networking and Computer Security in the 21st Century

What makes a security consultant an expert?

Vista security defeated; IOS rootkit; DNS flaw 'worse than thought'

What's inside the Apple iPhone 3G?

The Ten Most Important Security Trends of the Coming Year

Top Ten Cyber Security Menaces for 2008

Renaming the Administrator Account?

ACL Security in Windows Vista

Vista Security Is Annoying by Design

'Pro-Tibet' Rootkit Attacks Windows PCs

Virtualization's Dark Side

State Department IT requirements

Microsoft Speech Server SDK Installation

Object Capabilities

Customize a new Home Page

The Shell (_layoutWorkspace)

Customize Shell

Customize the Splash Screen for Startup

Navigation ( see _deckWorkspace)

Cabana Installation

Introduction