Toggle light / dark theme

“Kaspersky admits that targeted attacks represent less than one percent of the entire threat landscape”;

Hmmm (wonder how much it cost to develop and deploy?) At least it’s a start.

https://lnkd.in/bzjHfzF


The platform monitors and analyzes data collected from different points of the corporate IT infrastructure, including network activity from web and email.

Read more

This has been around for a really, really long time. I remember many years ago one could go online without too much hassel and locate software code that the hacking network shared to teach folks their trade. I actually tested some of it for a firm to help test their infrastructure security; and it worked really well. However, now days it’s about the trade of id’s, credit card information, etc.


Beyond the regular Web, there is the Dark Web. You’ve probably heard something about it but probably just enough to know you didn’t want to know too much more about it. Well, here are some answers to some common questions about the Dark Web.

Read more

One philosophy that I have often practice and encourage my team to do is to think like a hacker. It has served me and my teams well. At times; I have shared areas where risks exist in the emerging technologies; and hope that I don’t make folks too nervous. However, we all have to start thinking like hackers or pay the cost some day.


C-level executives from giant corporations and officials from the smallest companies all must think like hackers and test their cyber defenses regularly if they expect to avoid breaches of their systems.

That’s according to a panel of cybersecurity experts who recently spoke to a crowd gathered at the Donald Danforth Plant Science Center.

‘You have to adjust your expectation of what the other side looks like,’ said William Largent, a threat researcher for the Talos Group, Cisco. ‘It’s…

I always caution folks to never say “never” especially around hacking and worst case scenarios relating to security. Granted there is a balance around not going too overboard. However, when it comes to being risk adverse and determining how much risk your company can absorb must be a core piece of your assessment. And, an attack like the one by ISIS in this article can not be allowed.

https://lnkd.in/b-_mdNW


LONDON: ISIS terrorists hacked the website of a UK-based solar firm as revenge for the killing of one of their British Muslim members, a media report said on Sunday.

Self-styled Caliphate Cyber Army (CCA) members recently carried out the hack on the website of Solar UK, an East Sussex company in south-east England with only 11 staff, The Sunday Times reported.

The attack was reportedly to avenge the death of Junaid Hussain, an ISIS figure from Birmingham, and it saw customers being diverted to a web page featuring the terror group’s logo accompanied by a string of threats.

Read more

I see these growing exponentially in the next few years especially when companies introduce autonomous technologies. One must ponder how far will these go when the breach was inside a bank that is leveraging technology and/ or autonomous technologies from vendors. https://lnkd.in/bzXdix3


A number of data breach lawsuits have been filed against major enterprises in recent years, which could lead to mounting data breach costs.

Read more

I agree 100% with this report by former pentagon official on AI systems involving missiles.


A new report written by a former Pentagon official who helped establish United States policy on autonomous weapons argues that such weapons could be uncontrollable in real-world environments where they are subject to design failure as well as hacking, spoofing and manipulation by adversaries.

In recent years, low-cost sensors and new artificial intelligence technologies have made it increasingly practical to design weapons systems that make killing decisions without human intervention. The specter of so-called killer robots has touched off an international protest movement and a debate within the United Nations about limiting the development and deployment of such systems.

The new report was written by Paul Scharre, who directs a program on the future of warfare at the Center for a New American Security, a policy research group in Washington, D.C. From 2008 to 2013, Mr. Scharre worked in the office of the Secretary of Defense, where he helped establish United States policy on unmanned and autonomous weapons. He was one of the authors of a 2012 Defense Department directive that set military policy on the use of such systems.

Read more

What can be better than to go head to head against cyber attacks, let computer have a mind of their own and protect themselves? The executive producer of CBS hit show, Scorpion, and the CEO of Scorpion Computer Services, Walter O’Brien says that it not only is possible, but can be the only solution to stop such attacks.

@tferriss loved the Walter O’ Brien podcast. But, did you pick up on any issues with his story? https://t.co/jf8Gm2Ls1Y

— Vincent Hofmann (@vincenthofmann) February 22, 2016

Read more

The person in the article is not very smart. 1st you never offer a tempting challenge to a hacker in public forum. I have known too many and followed to many since the 80’s. 2nd, house burgulars are not even close to the calibur of hackers.


I own a 2013 Nissan LEAF SV with telematics functions known as CARWINGS. CARWINGS connected to my car via an app also called NissanConnect EV that was hacked by Troy Hunt and came into to the news this week. Nissan issued two different statements about the hack and eventually shut off the app completely.

LEAF owners are concerned that because the app was easy to-hack with the LEAF’s VIN number that access could be used for malicious use.

The LEAF’s VIN number can be clearly seen through the windshield.