Archive for the ‘cybercrime/malcode’ category: Page 204
Feb 29, 2016
Kaspersky Labs rolls out targeted threat detection platform for enterprises
Posted by Karen Hurst in category: cybercrime/malcode
“Kaspersky admits that targeted attacks represent less than one percent of the entire threat landscape”;
Hmmm (wonder how much it cost to develop and deploy?) At least it’s a start.
Continue reading “Kaspersky Labs rolls out targeted threat detection platform for enterprises” »
This has been around for a really, really long time. I remember many years ago one could go online without too much hassel and locate software code that the hacking network shared to teach folks their trade. I actually tested some of it for a firm to help test their infrastructure security; and it worked really well. However, now days it’s about the trade of id’s, credit card information, etc.
Beyond the regular Web, there is the Dark Web. You’ve probably heard something about it but probably just enough to know you didn’t want to know too much more about it. Well, here are some answers to some common questions about the Dark Web.
Feb 29, 2016
Google opens applications for free DDoS blocker to prevent hackers taking out the Web
Posted by Karen Hurst in categories: cybercrime/malcode, internet
The DDoS prevention tool is part of Google Ideas, renamed Jigsaw, whose stated mission is to “build products to help people investigate corruption.”
Feb 29, 2016
Want to avoid breaches Think like a hacker
Posted by Karen Hurst in category: cybercrime/malcode
One philosophy that I have often practice and encourage my team to do is to think like a hacker. It has served me and my teams well. At times; I have shared areas where risks exist in the emerging technologies; and hope that I don’t make folks too nervous. However, we all have to start thinking like hackers or pay the cost some day.
C-level executives from giant corporations and officials from the smallest companies all must think like hackers and test their cyber defenses regularly if they expect to avoid breaches of their systems.
That’s according to a panel of cybersecurity experts who recently spoke to a crowd gathered at the Donald Danforth Plant Science Center.
Continue reading “Want to avoid breaches Think like a hacker” »
Feb 29, 2016
IS hacks UK solar firm site in revenge
Posted by Karen Hurst in categories: cybercrime/malcode, solar power
I always caution folks to never say “never” especially around hacking and worst case scenarios relating to security. Granted there is a balance around not going too overboard. However, when it comes to being risk adverse and determining how much risk your company can absorb must be a core piece of your assessment. And, an attack like the one by ISIS in this article can not be allowed.
LONDON: ISIS terrorists hacked the website of a UK-based solar firm as revenge for the killing of one of their British Muslim members, a media report said on Sunday.
Feb 29, 2016
Data breach lawsuits indicate a troubling trend for enterprises
Posted by Karen Hurst in categories: cybercrime/malcode, robotics/AI
I see these growing exponentially in the next few years especially when companies introduce autonomous technologies. One must ponder how far will these go when the breach was inside a bank that is leveraging technology and/ or autonomous technologies from vendors. https://lnkd.in/bzXdix3
A number of data breach lawsuits have been filed against major enterprises in recent years, which could lead to mounting data breach costs.
Feb 28, 2016
Report Cites Dangers of Autonomous Weapons
Posted by Karen Hurst in categories: cybercrime/malcode, military, policy, robotics/AI
I agree 100% with this report by former pentagon official on AI systems involving missiles.
A new report written by a former Pentagon official who helped establish United States policy on autonomous weapons argues that such weapons could be uncontrollable in real-world environments where they are subject to design failure as well as hacking, spoofing and manipulation by adversaries.
In recent years, low-cost sensors and new artificial intelligence technologies have made it increasingly practical to design weapons systems that make killing decisions without human intervention. The specter of so-called killer robots has touched off an international protest movement and a debate within the United Nations about limiting the development and deployment of such systems.
Continue reading “Report Cites Dangers of Autonomous Weapons” »
Feb 28, 2016
Walter O’Brien Tipped As The Next Elon Musk, Ranked As One Of Five Smartest People Alive
Posted by Karen Hurst in categories: cybercrime/malcode, Elon Musk
What can be better than to go head to head against cyber attacks, let computer have a mind of their own and protect themselves? The executive producer of CBS hit show, Scorpion, and the CEO of Scorpion Computer Services, Walter O’Brien says that it not only is possible, but can be the only solution to stop such attacks.
@tferriss loved the Walter O’ Brien podcast. But, did you pick up on any issues with his story? https://t.co/jf8Gm2Ls1Y
Feb 28, 2016
Why I’m not worried about the LEAF hack or my garage break-in
Posted by Karen Hurst in categories: cybercrime/malcode, habitats, transportation
The person in the article is not very smart. 1st you never offer a tempting challenge to a hacker in public forum. I have known too many and followed to many since the 80’s. 2nd, house burgulars are not even close to the calibur of hackers.
I own a 2013 Nissan LEAF SV with telematics functions known as CARWINGS. CARWINGS connected to my car via an app also called NissanConnect EV that was hacked by Troy Hunt and came into to the news this week. Nissan issued two different statements about the hack and eventually shut off the app completely.
LEAF owners are concerned that because the app was easy to-hack with the LEAF’s VIN number that access could be used for malicious use.
Continue reading “Why I’m not worried about the LEAF hack or my garage break-in” »