Posts

How the Enlightenment Ends - The Atlantic

The NSA Wants a Skeleton Key to Everyone's Encrypted Data - Foundation for Economic Education

The Government Is Lying to Us About Cybersecurity - Foundation for Economic Education

The NSA Is Hoarding Vulnerabilities - Schneier on Security

The Government Is Lying to Us About Cybersecurity - Foundation for Economic Education

Cyber attacks bought ‘as easily as online shopping’

Ex-Dem IT aide Imran Awan pleads guilty to bank fraud in deal with prosecutors

Ex-CIA engineer accused of leaking hacking docs to WikiLeaks charged in massive 'Vault 7' security breach

Plan now for quantum computer attacks, experts warn

Phishing in a Nutshell: January – March 2018

Ex-CIA engineer accused of leaking hacking docs to WikiLeaks charged in massive 'Vault 7' security breach

US Cyber Command given powers to launch cyber attacks on other nations More aggressive strategy pushed by new White House security advisor John Bolton

Dixons Carphone hack explained: what happened and should you be worried?

Australia

Australia

Charges

Hackers Have Stolen $1.1B in Crypto This Year

National security - Axios

Iot

Visit this site https://cybersecurityventures.com

Deterring cyber attacks: Old problems, new solutions

Ransom ware

An FBI agent mapped out the countries capable of unleashing a crippling cyber attack on the US

Cars

The Anatomy of a Phishing Attack

FBI warns consumers on malware aimed at Internet routers - The Boston Globe

GDPR is now in force

Suspect revealed in CIA hacking tools dump

Cisco on Wednesday warned that hackers have infected at least 500,000 routers and storage devices in dozens of countries with highly sophisticated malicious software, possibly in preparation for another massive cyber attack on Ukraine

Router attack

What is GDPR? Technology explained

Atlanta recovery via insurance

Hacking

Corruption of superuser

Riverside attack

Top issues

SquirtDanger: The Swiss Army Knife Malware from Veteran Malware Author TheBottle

Cost of City of Atlanta's cyber attack: $2.7 million — and rising

Gas pipeline

Atlanta 2 weeks later

Re: With paper and phones, Atlanta struggles to recover from cyber attack

With paper and phones, Atlanta struggles to recover from cyber attack

Atlanta ransom ware

The grid

911

Atlanta

Cryptocurrency Hacking Raises Threats of Financial Vulnerability

Here's a List of 29 Different Types of USB Attacks

Germany Says Hackers Infiltrated Main Government Network

Cyberattacks Put Russian Fingers on the Switch at Power Plants, US Says

Detroit Free Press: Audit: State of Michigan computer systems are vulnerable to attack

Cert

Dragonfly: Western energy sector targeted by sophisticated attack group | Symantec Blogs

Cyberattacks Put Russian Fingers on the Switch at Power Plants, US Says

Explosive hack

Cyberthreats: The Vexing New Front in Modern Warfare

BBC News: The tactics of a Russian troll farm

The money in malware!

https://www.computing.co.uk/ctg/news/3026422/hacke...

How a Tiny Startup Became the Most Important Hacking Shop You've Never Heard Of

Fwd: test

Fwd: [New post] Is Blockchain right for your business?

Researchers find new flaw in Oracle

AMD will Spectre-proof the Zen 2 architecture, and 4 other nuggets from its earnings call

Intel's Never-Ending Spectre Saga Continues to be a Hot Mess

The Coincheck hack and the issue with crypto assets on centralized exchanges

ATM makers warn of 'jackpotting' hacks on US machines

Russia could cause ‘thousands and thousands’ of deaths through energy grid attack | E&T Magazine

Chrome attack

Meltdown echoes

Blokchain attack

Re: App SIP App shared by Ken Hh

Intel chip security fix could permanently slow down PCs by up to 30 per cent | E&T Magazine

We all need some of this....

Trust must always be minimal and subject to scientific proof through lambda-calculus and Church-Turing machinery implemented in hardware. K J HAMER-HODGES....E.G. Rutkowska: Trust Makes Us Vulnerable

Security industry needs to be less trusting to get more secure • The Register Forums

Apple releases patch for catastrophic security flaw in MacOS 10.13 | Computing

GDPR: What will happen in the first 72 hours after a data breach? | Computing

Re: [Caja] WASM and ocaps

BBC News: Artificial intelligence smart enough to fool Captcha security check

The KRACK Wi-Fi vulnerability, explained like you're five

Cat theory

MarketWatch: Opinion: The cyberwars are coming — here’s how to prepare (and make money)

Marketplace APM: 10/12/2017: A computer science "genius" on why we haven't fixed cybersecurity

Engadget: 37,000 Chrome users downloaded a fake Adblock Plus extension

Re: Unit 42 Threat Intelligence ALERT

Re: App VJ Foot Spa shared by Ken Hh

Sec hack

Play Store malware

Cost of Ransom ware attack on FedEx

Reuters: Exclusive: U.S. Homeland Security found SEC had 'critical' cyber weaknesses in January

Reuters | Homeland Security detected five critical cyber security weaknesses in SEC's computers in January: confidential report

Equifax data breach

Malware in trusted downlod

Piggy back hacking

Nothing can be trusted!

Cybersecurity Incident & Important Consumer Information | Equifax

The hidden history of cyber-crime forums - BBC News

Equifax data breach