Posts

ICCC Toronto, Canada, August 1976

The Guardian: Here's another virus terrorising businesses and causing havoc: ransomware

New York Post: Hackers reportedly paid Twitter staffer to help with high-profile attack

Protect Democracy | The Threat - Protect Democracy

VICE: Twitter Is Removing Images of Internal Tool Sources Say Enables Account Takeover

TechCrunch: A hacker used Twitter's own 'admin' tool to spread cryptocurrency scam

Forbes: Report: CIA Conducted Cyber Attacks Against Iran, Russia After Secret Trump Order In 2018

Changing System Architectures And The Complexities Of Apple’s Butterfly Approach To ISAs | Hackaday

Hacker breaches security firm in act of revenge | ZDNet

North Korea

Explosion at Iran

ZDNet: The more cybersecurity tools an enterprise deploys, the less effective their defense is

PC Gamer: Security firm warns of new malware strain 'wreaking havoc' on Windows PCs

Learn Kubernetes Basics | Kubernetes

Untangling the Tale of Ada Lovelace—Stephen Wolfram Writings

Microsoft: These hackers got from a broken password to full control of a network - in just days | ZDNet

Reuters: New Zealand seizes $90 million in assets of Russian cybercrime suspect

CNBC: Australia says it has been victim of 'state-based' cyber-attacks

Civilizing Cyberspace: The Fight for Digital Democracy

Forbes: New Google Chrome Threat: Stealthy Campaign Targets 32 Million Users Via Malicious Extensions

AWS said it mitigated a 2.3 Tbps DDoS attack, the largest ever | ZDNet

No, The U.S. Has Not Suffered The Biggest Cyber-Attack In History: Here’s What Actually Happened

The Washington Post: Elite CIA unit that developed hacking tools failed to secure its own systems, allowing massive leak, an internal report found

The Washington Post: Elite CIA unit that developed hacking tools failed to secure its own systems, allowing massive leak, an internal report found

Forbes: Google Confirms Serious New Problems For Chrome Users

Time for a Hardware Revolution

Android Authority: 11 Raspberry Pi projects for everyone: From beginners to pros

TechRadar: This dangerous new keylogger could change the entire malware space

Ars Technica: Intel will soon bake anti-malware defenses directly into its CPUs

South African bank to replace 12m cards after employees stole master key | ZDNet

Forbes: Google Issues Warning For Chrome Browser Users

DARPA Doubles Down on Chip-Level Cybersecurity - News

CNBC: Boeing aims for 737 Max recertification flight by the end of June

GovTech: Is a ‘Cyber Pandemic’ Coming?

Forbes: Apple Just Made A Striking New Security Move That Will Impact All Users

Computer Business Review: IT Services Giant Conduent Suffers Ransomware Attack, Data Breach

Ars Technica: Exploit code for wormable flaw on unpatched Windows devices published online

Google: Chinese and Iranian hackers targeted Biden and Trump campaign staffers | ZDNet

Fox News: You might want to change your password after this shocking study

TechRadar: Cybercriminals use malware-laced CVs to steal banking credentials

Forbes: Zoom’s Security Nightmare Just Got Worse: But Here’s The Reality

CyberNews.com: Everybody wants to be a hacker: Data suggests unprecedented interest in cybercrime during pandemic

TechRadar: Forget sextortion scams, we’re more worried about deepfake ransomware

Ars Technica: An advanced and unconventional hack is targeting industrial firms

Forbes: Cybersecurity's Greatest Insider Threat Is In The C-Suite

Cointelegraph: Ransomware Attack Kidnaps Austrian City

Confidential computing

Thousands of enterprise systems infected by new Blue Mockingbird malware gang | | The Latest Breaking News

Ransomware deploys virtual machines to hide itself from antivirus software | ZDNet

Forbes: Hackers Using 20-Year-Old Tech To Steal $$$ Via Your Phone Bill

What U.S. National Strategy Should Look Like In The Wake Of Coronavirus

Forbes: Microsoft Confirms Serious New Security Problem For Windows 10 Users

Forbes: New Apple Security Blow: If You Have An iPhone, Look Away Now

Re: Your friend has shared a ZDNet link with you

Russian hacker group using HTTP status codes to control malware implants | ZDNet

Most Leaders Don't Even Know the Game They're In | Simon Sinek at Live2Lead 2016

PROMOTING INDIVIDUALITY – Rippinit

Why Individualism is important, — Science Leadership Academy @ Center City

PC Gamer: Turns out converting files into images is a highly effective way to detect malware

Page Six: NYC attorney to likes of Lady Gaga, Elton John hacked, files held for $21M ransom

WIRED: Thunderbolt Flaws Expose Millions of PCs to Hands-On Hacking

Forbes: Ghost Confirms Hack Attack: 750,000 Users Spooked By Critical Vulnerability

Komando: Nasty malware steals banking passwords and 2FA codes

The Flaws in the Binary Computer

The Universal Model of Computation

The Gales in Cyberspace

The Digital Future

Virtualized Society

Maze Ransomware

Moving towards

Android Police: Researchers finally discover how Android malware that could survive factory resets works

Forbes: U.S. Government Offers $5 Million Reward To Identify North Korean Hackers

Forbes: Hacker Claims Android App Store Breach: Publishes 20 Million User Credentials

EDP faces $11m ransomware demand after 'potentially catastrophic' cyberattack | Recharge

CSO Online: Threat modeling explained: A process for anticipating cyber attacks

Popular Mechanics: The 737 MAX Has Been Grounded for a Year Because of Its Terrible Computers

The 10 biggest data hacks of the decade

Forbes: Windows OneDrive Security Vulnerability Confirmed: All You Need To Know

North Korea hacking threatens U.S., other countries, international financial system: U.S. State Department - Reuters

Answer to From a security perspective, what is more important to focus on: threats or vulnerabilities? by Flavius Hobbs 

Forbes: Windows 10 Warning: Anger At Microsoft Rises With Serious New Failure

Forbes: A Sinister New Botnet Could Prove Nearly Impossible To Stop

Password Writing Quiz to Help Bolster Your Online Passwords

The Verge: The ancient computers in the Boeing 737 Max are holding up a fix

Michael Burry of ‘The Big Short’ Slams Virus Lockdowns in Tweets - Bloomberg

Michael Burry of ‘The Big Short’ Slams Virus Lockdowns in Tweets - Bloomberg

Bloomberg: How Finastra Survived a Ransomware Attack Without Paying Ransom

OSI: The Internet That Wasn’t - IEEE Spectrum

Forbes: Millions Of Windows And Linux Systems Are Vulnerable To This ‘Hidden’ Cyber Attack

Forbes: Millions Of Windows 7, 8 And 10 Users Exposed To HP Security Vulnerabilities

Bloomberg: Boeing Finds New Software Flaws on 737 Max

DarkHotel hackers use VPN zero-day to breach Chinese government agencies | ZDNet

ZDNet: Docker servers targeted by new Kinsing malware campaign

Threat Alert: Kinsing Malware Attacks Targeting Container Environments

VentureBeat: Microsoft’s Mahjong-winning AI could lead to sophisticated finance market prediction systems

WIRED: A Hacker Found a Way to Take Over Any Apple Webcam

U.S. Government: Update Chrome 80 Now, Multiple Security Concerns Confirmed - Forbes

How learning Smalltalk can improve your skills as a programmer

MarketWatch: Marriott says data on 5.2 million guests may have been accessed in another major breach

Cost