Posts

When it all kicks off: What happens at a security firm when a global malware outbreak occurs?

Elon Musk just made Microsoft Azure 100% cooler by association

DNA attack

Doctor Opens Fire at Bronx Hospital, Killing Woman and Wounding 6 Others

Facebook now has 2 billion monthly users…and responsibility

Seven Things You Must Anticipate For The 2017 Solar Eclipse

Massive cyberattack hits Europe with widespread ransom demands

Blame game for cyber attacks grows murkier as spying, crime tools mix | Reuters

Blame game for cyber attacks grows murkier as spying, crime tools mix | Reuters

Cyber Threats 101: Fileless Attacks (The Stealthiest of All) - Infosecurity Magazine

Ponzi Scheme Meets Ransomware for a Doubly Malicious Attack - NYTimes.com

Blame game for cyber attacks grows murkier as spying, crime tools mix | Reuters

Cyber attack eases, hacking group threatens to sell code | Reuters

NHS cyber-attack causing disruption one week after breach | Society | The Guardian

NYTimes.com: Hackers Hide Cyberattacks in Social Media Posts

British Airways vows 'never again' after costly IT collapse

Microsoft issues 'highly unusual' Windows XP patch to prevent massive ransomware attack

Hacking Attack Has Security Experts Scrambling to Contain Fallout

Europol: Ransomware attack is of unprecedented level

Status report: Windows 10 Creators Update at one month old

Cyber executive order a reasonable step forward, yet more remains to be done

Ukrainian military compromised by Trojanised targeting app on soldiers' smartphones | Computing

Qubes OS plans commercial versions, team expansion

Cherokee, NC

UK rail network hit by multiple cyber attacks last year

Cyber attacks cost UK business more than £34bn a year, study shows

Google hopes cryptography will protect Chrome browsers from quantum computer attacks : Tech : Yibada

WIRED: Clever Attack Uses the Sound of a Computer’s Fan to Steal Data

Google is fighting future hackers with post-quantum cryptography

FBI Warns Nation-State Cyber Attacks Are Continuing

Fwd: Reuters: How a hacker's typo helped stop a billion dollar bank heist

Fwd: Reuters: How a hacker's typo helped stop a billion dollar bank heist

What's the point of secure software if you can't trust your CPU? - Computing. This is exactly the reason the PP 250 instruction set was built to guarantee security in hardware

Exclusive: Inside the ProtonMail siege: how two small companies fought off one of Europe's largest DDoS attacks - TechRepublic

Fwd: [cap-talk] [friam] Re: UX resources for object capabilities

Domain Shadowing - Wild West Of Internet Cyber Attacks »

EXCLUSIVE: Entire US national security system possibly compromised by year-long cyber-assault

How Hacking Team Created Spyware that Allowed the FBI To Monitor Tor Browser

Hacking Team Project X

Google Photos and the unguessable URL | The Verge

BBC News: US hit by 'massive data breach'

North Korean hackers 'could kill'

Delegation

Bug in 1,000 apps could open Apple devices to hacking - CBS News

Nearly 1 million new malware threats released every day April 14 - CNNMoney

HP Awards $240K for Firefox, IE, Chrome and Safari Exploits

Fwd: Hacking BIOS Chips Isn't Just the NSA's Domain Anymore | WIRED

Fwd: All four major browsers take a stomping at Pwn2Own hacking competition | Ars Technica

Fwd: [Caja] Understanding the difference between Google Caja and Secure ECMAScript (SES), and if SES is ready to use

PP250 Power Point Presentations

Thunderstrike MacBook malware attacks computers via Thunderbolt port | IT PRO

Fwd: [cap-talk] some capability queries

The FBI Used the Web's Favorite Hacking Tool to Unmask Tor Users | WIRED

Intel+boss'+warning+on+cyber+attacks+no+joke,+say+experts+|+Fox+News

Stealthy, sophisticated 'Regin' malware has been infecting computers since 2008 | PCWorld

Ghosts in the machine language – Elevate

Fwd: [cap-talk] A new type of phishing attack

Fwd: [Caja] Rich-text editors compatible with Caja

Do airplanes evolve like birds? - CSMonitor.com

How a bug in Windows might be costing humanity over 600 years of wasted time per day - garry's posthaven

EXECUTION ENVIRONMENTS | Hypervisor

Cyber attack on oil firms ‘could cost billions’ - Top stories - The Scotsman

About seL4 | seL4

Fwd: [cap-talk] Fwd: seL4 is going open source

What To Do If Your iPhone Is Hacked And Remotely Locked : All Tech Considered : NPR

Iranian Hackers Stalked U.S. Officials, Report Says - Bloomberg

Scientists achieve reliable quantum teleportation for first time

Edward Snowden responds to release of e-mail by U.S. officials - The Washington Post

Estonia exercise shows NATO's growing worry about cyber attacks | Science & Technology | Worldbulletin News

The biggest ever cyber attacks and security breaches - Telegraph

Car-Hacking Goes Viral In London - Forbes

Dozens of Arrests in 'Blackshades' Hacking Around the World - ABC News

Alleged Chinese Hacking: Alcoa Breach Relied on Simple Phishing Scam - WSJ.com

Military acquisition rules hamper U.S. ability to counter cyber threats

Hackers ramp up computer attacks that demand 'ransom'

Chinese military officers charged with hacking U.S. Steel, Allegheny Technologies, Westinghouse - Pittsburgh Business Times

Dozens of Arrests in 'Blackshades' Hacking Around the World - ABC News

Lockheed Martin says cyber attacks swell - Computer Business Review

Hackers ramp up computer attacks that demand 'ransom'

THE UNCERTAINTY OF GENERAL PURPOSE DIGITAL COMPUTERS

Exclusive: Meet the Fed's First Line of Defense Against Cyber Attacks

Fed_Cybersecurity_RD_Strategic_Plan_2011.pdf

Critical Security Update for Internet Explorer

Authority Based Access Control : Open Social Networking and Computer Security in the 21st Century

What makes a security consultant an expert?

Vista security defeated; IOS rootkit; DNS flaw 'worse than thought'

What's inside the Apple iPhone 3G?

The Ten Most Important Security Trends of the Coming Year

Top Ten Cyber Security Menaces for 2008

Renaming the Administrator Account?

ACL Security in Windows Vista

Vista Security Is Annoying by Design

'Pro-Tibet' Rootkit Attacks Windows PCs

Virtualization's Dark Side

State Department IT requirements

Microsoft Speech Server SDK Installation

Object Capabilities

Customize a new Home Page

The Shell (_layoutWorkspace)