ProtectMyID: Treat your personal information like cash. Don’t hand it out to just anyone. Have a #safeweekend View full post on Twitter / ProtectMyID View full post on National Cyber Security
Malware spreads like wild fire in Syrian conflict
A new nasty piece of malware is now being used in the ongoing conflict in Syria, with the ability to take over an infected computer or steal documents from it. Photo credit: http://wideshut.co.uk Computer security firm Trend Micro cited reports that the malware, dubbed as DarkComet, is being used against…
MindshaRE: Yo Dawg, I heard you like reversing…
Posted by Aaron Portnoy …so I reversed your reversing tool to help you reverse better. MindshaRE is our periodic look at some simple reverse engineering tips and tricks. The goal is to keep things small and discuss every day aspects of reversing. You can view previous entries by going through…
ProtectMyID: ID protection is like safe driving. It’s not enough to know how to use the phone or Internet. You must be aware of external risks.
ProtectMyID: ID protection is like safe driving. It’s not enough to know how to use the phone or Internet. You must be aware of external risks. View full post on Twitter / ProtectMyID View full post on National Cyber Security
David Cameron Acts like an ‘Equal Opportunity Offender’
COMMENTARY | The BBC reported Wednesday that during "Prime Minister's Questions," British Prime Minister David Cameron called one of the elder statesmen of the opposition Labour Party, Member of Parliament (MP) Dennis Skinner, "a dinosaur" after answering the latter's question about whether or not he'd appear at a phone-hacking inquiry….
Israel vows treat hackers like other ‘terrorists’
Israel said on Saturday that it will respond to cyber-attacks in the same way it responds to violent “terrorist” acts, by striking back with force against hackers who threaten the Jewish state. View full post on cyber terrorism – Yahoo! News Search Results View full post on National Cyber Security
Hacker Attacks Like Stratfor’s Require Fast Response
After a prominent attack on Stratfor, a security group, specialists in computer breaches say companies that are under siege must act quickly to assess and contain the damage. View full post on facebook hacker – Yahoo! News Search Results View full post on National Cyber Security
ProtectMyID: While you’re #holidayshopping, watch your credit card like a hawk. “Out of sight, out of control,” says @ITRCSD. http://t.co/WCtREy8k
ProtectMyID: While you’re #holidayshopping, watch your credit card like a hawk. “Out of sight, out of control,” says @ITRCSD. http://t.co/WCtREy8k View full post on Twitter / ProtectMyID View full post on National Cyber Security
Computer tech law: like a giant Trojan worm
The political effect of such a broad approach is to splinter criticism, not allowing focus on a single point of attack. This places the politician and bureaucrat in a position to cherry pick which arguments to uphold, which to reject, while keeping the essence unchanged. The Peaceful Assembly Bill is…
Japan plans smart grids that could treat energy ‘like network data’
Using concepts from IT and networking, a Japanese consortium plans to develop large-scale energy grids that will handle power the way the Internet handles data, using “routers” and “service providers” to efficiently manage and direct the flow of electricity. The Digital Grid Consortium, which was officially founded in September and…