Tuesday 31 March 2015

Hillary Clinton also used an iPad for e-mails, undercutting her single-device defense



from Cyber Security Dojo http://ift.tt/1Dr5glf

via IFTTT

Facebook is tracking you even if you log out and ask never to be followed, report claims



from Cyber Security Dojo http://ift.tt/1Nzmhe0

via IFTTT

Technology not a fix-all for cybersecurity | cyber security dojo



from Cyber Security Dojo http://ift.tt/1C3runA

via IFTTT

Deloitte, Verizon partner to provide cybersecurity services | cyber security dojo



from Cyber Security Dojo http://ift.tt/1DnHpTi

via IFTTT

Why cyber defense ultimately rests with the private sector | cyber security dojo



from Cyber Security Dojo http://ift.tt/1CINclO

via IFTTT

Internet of Things Prompts New Cybersecurity Risks | cyber security dojo



from Cyber Security Dojo http://ift.tt/1CINc5u

via IFTTT

root9B Technologies Chairman and CEO Joseph J. Grano, Jr. Issues 2014 Letter to Shareholders |...



from Cyber Security Dojo http://ift.tt/19FGWzN

via IFTTT

Israel’s Gift to Asia: Water and Cybersecurity | cyber security dojo



from Cyber Security Dojo http://ift.tt/19y7bs1

via IFTTT

The Cybersecurity Proportional Law (aka Oltsik’s law) | cyber security dojo



from Cyber Security Dojo http://ift.tt/1ExWZNS

via IFTTT

Congressman: ‘No Way To Prevent’ Cyber Attacks | cyber security dojo



from Cyber Security Dojo http://ift.tt/1ExX1W4

via IFTTT

MIT CSAIL Students Are Launching a Cybersecurity Startup Program | cyber security dojo



from Cyber Security Dojo http://ift.tt/1ExX1VR

via IFTTT

Iran: The West’s Most Dangerous Foe in Cyberspace? | cyber security dojo



from Cyber Security Dojo http://ift.tt/1C2xsVT

via IFTTT

Global Utility Infrastructure Security Market 2015-2019 – Physical Security and Cybersecurity...



from Cyber Security Dojo http://ift.tt/1C2xs8m

via IFTTT

EU moves to unblock TV streaming services



from Cyber Security Dojo http://ift.tt/1HTq5ov

via IFTTT

Man who sued Comcast now wants over $5M, says ISP shouldn’t have smeared him



from Cyber Security Dojo http://ift.tt/1IhZdP7

via IFTTT

US Supreme Court: GPS tracking could violate the Fourth Amendment



from Cyber Security Dojo http://ift.tt/1BGUIc5

via IFTTT

Monday 30 March 2015

Black America's State of Surveillance | The Progressive



from Cyber Security Dojo http://ift.tt/1G2uVm3

via IFTTT

cryptome.org



from Cyber Security Dojo http://ift.tt/1lMFno0

via IFTTT

2 Ex-Federal Agents in Silk Road Case Are Charged With Fraud



from Cyber Security Dojo http://ift.tt/1DextvB

via IFTTT

Europe’s law enforcement chief joins in crypto panic



from Cyber Security Dojo http://ift.tt/1Dl3xPX

via IFTTT

Anonymous - The 5th of November, Are you ready?

Today in Cyber Security News: http://ift.tt/1F3mnuI

from Cyber Security Dojo http://ift.tt/1oBikcP

via IFTTT

NSA shooting: One dead after car rams security gate



from Cyber Security Dojo http://ift.tt/1DdUuie

via IFTTT

Preventative Tech Tips for Cryptolocker



from Cyber Security Dojo http://ift.tt/1FVvLQ0

via IFTTT

ZUCKERBERG TALKS FACEBOOK’S CYBERSECURITY STRATEGY | cyber security dojo



from Cyber Security Dojo http://ift.tt/1GHn1hg

via IFTTT

US Used Zero-Day Exploits Before It Had Policies for Them | cyber security dojo



from Cyber Security Dojo http://ift.tt/1HfDM16

via IFTTT

Stifel’s Talpaz: Underinvestment in Cybersecurity Is ‘Criminal’ | cyber security dojo



from Cyber Security Dojo http://ift.tt/19BlmfM

via IFTTT

NSA considered ending phone surveillance program -- report - CNET



from Cyber Security Dojo http://ift.tt/1BX2j66

via IFTTT

U.S. coding site under cyber attack | cyber security dojo



from Cyber Security Dojo http://ift.tt/1abudG0

via IFTTT

The number one e-commerce security issue is fraud: Christopher Young

Intel Security’s senior VP on cyber security, the McAfee acquisition and the debate over sharing sensitive company information with govts

Mumbai: Intel Security, the $3 billion unit of the $56 billion Intel Group, is sharpening its focus on protecting mobile devices, which it believes is the fastest-growing computing platform. Christopher D. Young, senior vice-president and general manager of Intel Security talks about how the company’s $7.6 billion acquisition of McAfee Inc. five years ago, has helped its growth, Intel’s security solutions for wearables and other devices and the debate over sharing sensitive company information with governments while enforcing security controls. Edited excerpts from an interview: How serious are companies about security? Security can be broadly characterized into three parameters: protecting, detecting, responding. Till recently, the primary focus area of most of the security industry was about protection. However, we are now seeing a clear shift to detection and recovery, given that all the new technologies customers want revolve around these two pillars. Faster time to recovery is the number one focus for our customers today, in terms of advanced malware detection, intelligence tools and analytics tools. Another significant change is the priority that security is being given by enterprises today—evolving from an afterthought to a boardroom discussion, with companies willing to spend a considerable amount on security today. How is India placed in terms of company and individual security? According to Intel Security, in India, of all the attacks, 34% occur in the financial sector and 34% in the IT sector—two of the biggest industries in the country. Interestingly, ransomware or malware is the single highest type of attack accounting for 11% of all attacks, and we think this points to the need for better gateway products that stop the efficacy of ransomware. The second most common of attacks are autorun worms, which take advantage of unpatched systems, accounting for 10% of all attacks. On the consumer side, 48% of all attacks are autorun viruses, which points to the fact that both enterprises and individuals in India are not patching their systems with the latest updates. With e-commerce booming, what are the possible security threats looming ahead? The number one e-commerce security issue is fraud. A lot of the fraud starts with somebody stealing a consumer’s credit card number, bank information, credentials, etc. They do this by putting malware on a person’s device and then watching what the person types to steal credentials. So a lot of money is being lost in e-commerce. However, consumers can do a lot more to protect their systems like making sure their systems are patched, that they have malware cleaner or block malware, and keep stronger passwords. We work with law enforcement agencies and try to message our customers so that they don’t download fake updates. But ultimately, customers need to be more vigilant. What does Intel Security recommend after a company gets attacked? Currently, the security industry is very fragmented. It’s not uncommon for me to talk to a customer who uses 50 different security companies to provide different parts of their security infrastructure. However, if an enterprise were to use a single company or fewer companies to provide their security needs, dealing with recovery after an attack could be a much more efficient process, as it involves fewer systems talking to each other. For example, Intel Security has the ability to cater to at least 80% of an enterprise’s security needs, including a firewall, an IPS (PS stands for Intrusion Prevention System), endpoint security, security gateways for email, browsers, etc. We provide all these products with a connected architecture so that they can share threat information, making it much simpler for the security analyst to solve the issue, saving time and complexity. In this way, we estimate that the number of people involved in alleviating an attack can be cut by at least 30%. Securing mobile devices is equally important. What does Intel Security suggest? On the consumer side, we offer free anti-malware solution for Android devices; so, anybody can go to our website and download it, and it’s one way we believe we can help consumers protect themselves against malware on the mobile device, which is the fastest growing platform in computing. On the enterprise side, we have developed a whole new set of tools, technologies and services that can help our customers become faster in detecting and responding to a threat. Besides, we also have anti-malware for these devices, secure data storage, secure data vaults that will help you encrypt your data on phones and tablets to store them in the cloud. What about protection for wearables? For the Internet of Things (IoT) specifically, we have gateway solutions, application controls, etc., to protect data that gets generated on wearables and other such types of devices. We bundle security with the gateway application that connects the wearable to the cloud and we can provide good controls that way. Companies and governments are yet to reach an agreement over stronger security controls and compromising privacy of individuals… Reaching a compromise on encryption between private companies and the government for surveillance is going to be largely situational. Security and privacy have a complex relationship with one another—most of the times you need good security to ensure privacy. But sometimes, in order to deliver good security, you need to break privacy. The only way to get the balance right is for an organization to apply security and privacy controls to their context. What about cyberwar between nations? It’s a very complex problem to solve when your whole geopolitical system is literally based on geography, when cybersecurity challenges the very notion of any government of any country because it’s not bound by land. We need to have a United Nations-like model for cybersecurity with enforcement being part of it. We are still early in that discussion, but US president Barack Obama has finally started talking about it.


Source: http://ift.tt/1DljYeZ






from cyber security caucus http://ift.tt/1DljXYB

via IFTTT

General Insurance Article – AGCS appoint first dedicated cyber risk consultant in the UK | cyber...



from Cyber Security Dojo http://ift.tt/1BX7UcN

via IFTTT

Tech conference bans scantily-clad “booth babes”



from Cyber Security Dojo http://ift.tt/1MoexAm

via IFTTT

Catching Up: Cyberattacks quiet for a week, could still continue | cyber security dojo



from Cyber Security Dojo http://ift.tt/19pUzDh

via IFTTT

EC-Council and CSI Partner to Add Cyber Security Education to School Curriculums

The Computer Society of India and EC-Council are coming together to add cybersecurity education to school curriculums all across India, based on the foundational EC-Council program, Certified Secure Computer User (CSCU).


The Computer Society of India and EC-Council are teaming up to increase cybersecurity awareness curriculum in schools across India. The goal of the program is to expose students to the subject of cyber security at a young age as a prospective career choice in order to help satisfy the growing demand in India for cyber-security professionals. As a side benefit, even students who do not end up having a career in cybersecurity will learn valuable cyber security skills – skills seriously lacking in the general public.


Cyber security isn’t just lacking in the general public – it’s a problem in the IT industry as well. India, a country recognized for its technological industry, itself was found lacking when EC-Council analyzed its programmers’ skills through the Code.Uncode competition. EC-Council found that just under one percent of India’s computer engineers had basic skills in secure coding.


India houses 1,125,588 primary schools and 181,404 secondary schools with most of the schools in metro areas like Delhi NCR, Mumbai, Chennai, Bangalore, Hyderabad, etc. The issue of cyber-crime is a rising concern and to tackle it efficiently and effectively, defense has to start early. School students have to be trained on the basics of cyber security. Knowledge of cyber security is no longer just a requirement for IT professionals, but a set of skills every citizen using computer should have.


About EC-Council

The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. EC Council is the owner and developer of the world-famous E-Council Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Tester (LPT) programs, and various others offered in over 60 countries around the globe. These certifications are recognized worldwide and have received endorsements from various government agencies including the US Federal Government via the Montgomery GI Bill, and the US Government National Security Agency (NSA) and the Committee on National Security Systems (CNSS) certifying EC-Council’s Certified Ethical Hacking (CEH), Network Security Administrator (ENSA), Computer Hacking Forensics Investigator (CHFI), Disaster Recovery Professional (EDRP), Certified Security Analyst (E|CSA) and Licensed Penetration Tester (LPT) program for meeting the 4011, 4012, 4013A, 4014, 4015 and 4016 training standards for information security professionals and most recently EC-Council has received accreditation from the American National Standards Institute (ANSI).

For more information about EC-Council, please visit http://ift.tt/VT9izl.


About CSI:

The mission of CSI is to facilitate research, knowledge sharing, learning and career enhancement for all categories of IT Professionals, while simultaneously inspiring and nurturing new entrants into the industry and helping them to integrate into the IT community. The CSI is also working closely with other industry associations, government bodies and academia to ensure that the benefits of IT advancement ultimately percolate down to every single citizen of India. To help achieve these goals, the CSI has several Special Interest Groups (SIG’s), and various initiatives pertaining to affordable computing and the spread of computer literacy.

Source: http://ift.tt/19AV119






from cyber security caucus http://ift.tt/1ErlcW8

via IFTTT

Law firms are a hacker’s “treasure trove” | cyber security dojo



from Cyber Security Dojo http://ift.tt/1F9Oea5

via IFTTT

Global cybersecurity market that is all set to grow exponentially during the forecast 2024 just...



from Cyber Security Dojo http://ift.tt/1HX2uH0

via IFTTT

Cybersecurity management- it’s a numbers game



from Cyber Security Dojo http://ift.tt/1Nx6m1z

via IFTTT

Europol chief joins David Cameron in slating encryption | cyber security dojo



from Cyber Security Dojo http://ift.tt/1MnQzFa

via IFTTT

FDA 'Taking a Very Light Touch' on Regulating the Apple Watch



from Cyber Security Dojo http://ift.tt/19nqqVa

via IFTTT

Uber details up for sale in dark web marketplace | cyber security dojo



from Cyber Security Dojo http://ift.tt/1BDW5IH

via IFTTT

Don’t See Evil: Google’s Boycott Campaign Against War Photography and Alternative Media «...



from Cyber Security Dojo http://ift.tt/1ET4n17

via IFTTT

Anonymous - The Secrets of Scientology Full Documentary

All Things Cyber Security http://ift.tt/1F3mnuI

from Cyber Security Dojo http://ift.tt/1BHv1IV

via IFTTT

A Day in the Life of a SSCP - Chuck Gaughf

Welcome to the world of Cyber Security : http://ift.tt/1F3mnuI

from Cyber Security Dojo http://ift.tt/1a9OJH8

via IFTTT

Sunday 29 March 2015

Anonymous - Wikileaks Full Documentary

No other source has more on Cyber Security than http://ift.tt/1F3mnuI

from Cyber Security Dojo http://ift.tt/1oS5ln6

via IFTTT

California Legislators Pushing Warrant Requirement For All Access To Electronic Information,...



from Cyber Security Dojo http://ift.tt/1M7ejxc

via IFTTT

Benghazi chairman: Clinton wiped private email server ‘clean’



from Cyber Security Dojo http://ift.tt/1xlqTlE

via IFTTT

BBC-featured 'block bot' runs into legal trouble - Breitbart



from Cyber Security Dojo http://ift.tt/1I7tvog

via IFTTT

Copyright crackdown: Government introduces website-blocking bill



from Cyber Security Dojo http://ift.tt/1OMPUvK

via IFTTT

Technology and democracy: restructuring our politics in the Internet age [Proposal] :...



from Cyber Security Dojo http://ift.tt/1Nr5Nq9

via IFTTT

Saturday 28 March 2015

How Lloyd’s joined the war on global terror | cyber security dojo



from Cyber Security Dojo http://ift.tt/1HcCK5T

via IFTTT

Citigroup Inc Reports On Law Firms’ Cyber Attacks | cyber security dojo



from Cyber Security Dojo http://ift.tt/1BS4Le6

via IFTTT

Don’t buy insurance after the fire: Protecting your business against DDoS attacks | cyber...



from Cyber Security Dojo http://ift.tt/1D16uTW

via IFTTT

On the Frontlines of Cyber War | cyber security dojo



from Cyber Security Dojo http://ift.tt/1BESDhG

via IFTTT

Where does the word cyber come from? | cyber security dojo



from Cyber Security Dojo http://ift.tt/1NoEVqD

via IFTTT

ONR Reservist Wins Federal 100 Award for Cyber Warfare Efforts | cyber security dojo



from Cyber Security Dojo http://ift.tt/19aokYD

via IFTTT

Getting Everyone on Board to Battle Security Risks | cyber security dojo



from Cyber Security Dojo http://ift.tt/1NovwxE

via IFTTT

Effective cybersecurity: 8 questions for you and your team | cyber security dojo



from Cyber Security Dojo http://ift.tt/19a5eSz

via IFTTT

Shares Of CyberArk (CYBR), Palo Alto Networks Inc Gain After House Committee Approves Bill |...



from Cyber Security Dojo http://ift.tt/1G2orCc

via IFTTT

Firms can’t afford to fail at cybersecurity | cyber security dojo



from Cyber Security Dojo http://ift.tt/19a0Eng

via IFTTT

Friday 27 March 2015

Is this smashed MacBook Air a piece of art?



from Cyber Security Dojo http://ift.tt/1F27o1G

via IFTTT

New anti-malware weapon launched as NZ cyber security takes giant leap forward | cyber security dojo



from Cyber Security Dojo http://ift.tt/1BAwG3u

via IFTTT

Security Innovation to speak at Automotive Cyber Security Summit Detroit | cyber security dojo



from Cyber Security Dojo http://ift.tt/1BAwFfL

via IFTTT

PhishMe raises $13m to train enterprise staff in phishing detection | cyber security dojo



from Cyber Security Dojo http://ift.tt/19ZVOK9

via IFTTT

Popular hotel Internet gateway devices vulnerable to hacking | cyber security dojo



from Cyber Security Dojo http://ift.tt/1HTgktT

via IFTTT

Anonymous Hackers 2015 Update: Collaborated with 2 Other Hacktivists, Ghostsec and Ctrlsec to...



from Cyber Security Dojo http://ift.tt/1H6N7Z0

via IFTTT

NY to investigate insurers’ cybersecurity work after hacks | cyber security dojo



from Cyber Security Dojo http://ift.tt/1McosbV

via IFTTT

One in Three Websites Are Compromised or at Risk, Says Stealth Cybersecurity Vendor | cyber...



from Cyber Security Dojo http://ift.tt/194Fuqx

via IFTTT

cybersecuritydojo.com



from Cyber Security Dojo http://ift.tt/1FRX0wz

via IFTTT

UK gov’t launches hackathon for next-gen cybersecurity specialists | cyber security dojo



from Cyber Security Dojo http://ift.tt/1F1a8fJ

via IFTTT

Top 50 brightest cyber security minds sought for government-backed hackathon | cyber security dojo



from Cyber Security Dojo http://ift.tt/1EbemnB

via IFTTT

Cybersecurity – You’re Already Compromised | cyber security dojo



from Cyber Security Dojo http://ift.tt/1D6ggpt

via IFTTT

Is it legal for US military to scan the public’s computers for kid porn?



from Cyber Security Dojo http://ift.tt/1yiNCdg

via IFTTT

Thursday 26 March 2015

Your guide to the data retention debate: what it is and why it’s bad



from Cyber Security Dojo http://ift.tt/1H2uFAN

via IFTTT

UN creates digital privacy watchdog



from Cyber Security Dojo http://ift.tt/1M7553X

via IFTTT

Inquiry Launched into New Zealand Mass Surveillance - The Intercept



from Cyber Security Dojo http://ift.tt/1915GSQ

via IFTTT

CMU grads are turning to crowdfunding to start new political party



from Cyber Security Dojo http://ift.tt/1BX90bR

via IFTTT

Australian government minister: Dodge new data retention law like this



from Cyber Security Dojo http://ift.tt/191n1Lr

via IFTTT

Lloyd’s of London profits unchanged | cyber security dojo



from Cyber Security Dojo http://ift.tt/1HPuEAe

via IFTTT

State-backed cybercrime hits our screens | cyber security dojo



from Cyber Security Dojo http://ift.tt/1HPcGxQ

via IFTTT

media.nzherald.co.nz



from Cyber Security Dojo http://ift.tt/1IfKxk9

via IFTTT

Government brings together 50 talented young minds to tackle cyber-security issues | cyber...



from Cyber Security Dojo http://ift.tt/1FMFKsi

via IFTTT

100% of UK Organisations Suffer Cyber Security Attacks | cyber security dojo



from Cyber Security Dojo http://ift.tt/1M5J2uF

via IFTTT

Lessons from the new threat environment from Sony, Anthem annd ISIS | cyber security dojo



from Cyber Security Dojo http://ift.tt/1GuhkD8

via IFTTT

Corporate Sovereignty Provisions Of TPP Agreement Leaked Via Wikileaks: Would Massively...



from Cyber Security Dojo http://ift.tt/1HLzej0

via IFTTT

FireEye CEO Dave DeWalt to Urge State Officials to Make Cyber Security a Top Priority | cyber...



from Cyber Security Dojo http://ift.tt/1CRM9QX

via IFTTT

Iran Case Is So Secret It Can't Go On



from Cyber Security Dojo http://ift.tt/1bthpv2

via IFTTT

British cybersecurity fears ‘crypto-apocalypse’ | cyber security dojo



from Cyber Security Dojo http://ift.tt/1D24HzB

via IFTTT

The underworld of the internet: The UAE’s struggle with cybersecurity

Mohammad Amin Hasbini, senior security researcher at Kaspersky Lab, speaks about cyber security. Antonie Robertson / The National


Cyberattacks are rampant in the UAE, the second most targeted in the Middle East last year. With so many children online from an early age, parents must ensure they remain protected from bullying and manipulation.


Every day, the UAE comes under attack in ways that many of us never see and the youngest and most vulnerable are targets.


Despite the country’s relatively small population, it was the second most attacked Middle East country online last year, a new survey shows.


At blame is the proliferation of devices that now form an inseparable part of our daily lives, says Mohammad Amin Hasbini, a senior security researcher with the software provider Kaspersky Lab, who conducted the survey with B2B International.


“As you know, we are all using multiple devices,” says Mr Hasbini. “Every one of us now has at least five devices at home.


“Some of the statistics mention that over 60 per cent of children above 3 to 4 years old have smartphones.”


Children, he says, have better access to smartphones than laptops and computers because they are portable and because parents like to be able to contact their children at all times.


“We are living in an advanced society and internet penetration and fast internet services are available to everyone,” says Mr Hasbini.


“That’s another indication that we need to follow up on what is happening, and we need to follow up on our children because threats are there and we need to act on them.”


But it is not just children who are naive when it comes to cyber security. The report also found that more than half of UAE respondents use free public Wi-Fi, with only 31 per cent of them taking precautions.


This is particularly lax, given that 2.5 million of the attacks last year were network attacks, which Mr Hasbini says make users vulnerable to “script kiddies”.


These are amateurs who download and run scripts developed by other programmers to attack websites and people, redirecting them to malicious websites, stealing information and generally causing havoc.


Meanwhile, nine in 10 people said they trusted computers and smartphones to store corporate, personal and financial data, while 42 per cent used unsafe methods to store passwords.


This haphazard approach puts users at risk of phishing, where “bad emails” contain links to malicious websites.


These mimic popular websites and lure users into entering their usernames and passwords, which criminals can then use on the real websites.


These lures can be sent through SMS, email, social networking sites and any other form of contact. “These are very active and very dynamic,” says Mr Hasbini, and “very difficult to monitor and detect”.


Another type of attack that is on the rise is ransomware: malicious files that encrypt the documents and files on people’s computers so they cannot access them.


Given how much information people store on their computers and devices, most are likely to pay a ransom to recover these files, says Mr Hasbini.


Some ransoms may be set as high as €1,500 (Dh6,035) and unless people have good security, they may have no other way to recover their files.


Kaspersky detects and analyses 325,000 malicious files every day. But it is not just computers that are at risk. The company detects 28,000 unique files a month just for the Android operating system.


“You receive a link via SMS on your device,” Mr Hasbini says. “This link then installs a certain application that starts monitoring all your traffic, stealing all your photos, all your data, all your passwords, and then these will be used in many bad activities.”


Perhaps, to those without children, a more ominous threat is the risk of financial attack. Many people use smartphones to access banking and government services, and even those who are familiar with financial threats are at risk.






from cyber security caucus http://ift.tt/1GtHPbS

via IFTTT

Carter: Cyberworkforce Development Is a Model for DOD | cyber security dojo



from Cyber Security Dojo http://ift.tt/1Bt47ok

via IFTTT

Cybersecurity remains a weak spot, top intelligence official says | cyber security dojo



from Cyber Security Dojo http://ift.tt/1OAEBqo

via IFTTT

RETAIL’S CYBERSECURITY CENTER ADOPTS INTEL-SHARING PORTAL | cyber security dojo



from Cyber Security Dojo http://ift.tt/1IyMcl2

via IFTTT

Google joins Microsoft, Apple, others in surveillance reform plea | ZDNet



from Cyber Security Dojo http://ift.tt/1E3ydVr

via IFTTT

Mandatory Metadata Retention passes into law in Australia • /r/snowden



from Cyber Security Dojo http://ift.tt/1IxUxFz

via IFTTT

Wednesday 25 March 2015

Errata Security: x86 is a high-level language



from Cyber Security Dojo http://ift.tt/1CoHeGG

via IFTTT

PATRIOT Act axed, NSA spying halted ... wake up, Neo, it's just a dream in the US House of Reps



from Cyber Security Dojo http://ift.tt/1CPBt5t

via IFTTT

Article linking copyright question • /r/cyberlaws



from Cyber Security Dojo http://ift.tt/1CPJnMc

via IFTTT

FORMER NSA DIRECTOR: BREACHES WILL GET WORSE | cyber security dojo



from Cyber Security Dojo http://ift.tt/1EUGQPK

via IFTTT

CSI Introduces Cybersecurity Risk Assessment Service in Response to Increased Regulatory...



from Cyber Security Dojo http://ift.tt/1y83wam

via IFTTT

As Cyber Hacks Multiply, Can Companies Manage the Risks? | cyber security dojo



from Cyber Security Dojo http://ift.tt/1CYQd3B

via IFTTT

US Pressured Japan, Canada, New Zealand And Others Into Extending Copyright | Techdirt



from Cyber Security Dojo http://ift.tt/1DZIYs7

via IFTTT

Cybersecurity legislation moves through Congress | cyber security dojo



from Cyber Security Dojo http://ift.tt/1N8N3eR

via IFTTT

UK Government Coughs Up £5m in Cybersecurity Funding | cyber security dojo



from Cyber Security Dojo http://ift.tt/1HFfvBp

via IFTTT

Google meets with White House officials once a week on average



from Cyber Security Dojo http://ift.tt/1bthr68

via IFTTT

RSA’s Mike Brown: Cybersecurity Framework, Added Legislation to Support Obama Cyber EO | cyber...



from Cyber Security Dojo http://ift.tt/1BnngrQ

via IFTTT

Omnicom’s FleishmanHillard Offers Cybersecurity Solutions | cyber security dojo



from Cyber Security Dojo http://ift.tt/1CaOWD2

via IFTTT

Financial Industry Tech Opportunities — Cybersecurity, Mobility, BC/DR and More | cyber security...



from Cyber Security Dojo http://ift.tt/1CaOVik

via IFTTT

EU: Don’t use Facebook if you want to keep the NSA away from your data



from Cyber Security Dojo http://ift.tt/1y6MyZS

via IFTTT

New York Fed creates cyber squad | cyber security dojo



from Cyber Security Dojo http://ift.tt/1ETG85j

via IFTTT

The race to build the Silicon Valley of cybersecurity | cyber security dojo



from Cyber Security Dojo http://ift.tt/1DZvuN1

via IFTTT

Facebook data row reaches top Euro court



from Cyber Security Dojo http://ift.tt/1CndauV

via IFTTT

Uber And Ola Ordered To Stop Operating In New Delhi Until They Obtain Taxi Licenses



from Cyber Security Dojo http://ift.tt/1Cp7wIN

via IFTTT

Android flaw puts personal data at risk for millions



from Cyber Security Dojo http://ift.tt/1EPRXtg

via IFTTT

Silk Road drug dealer who cooperated, then fled, sentenced to five years



from Cyber Security Dojo http://ift.tt/1BlfYoF

via IFTTT

Tuesday 24 March 2015

Snowden dump details Canadian spies running false flag ops online



from Cyber Security Dojo http://ift.tt/1NdlsHF

via IFTTT

Defence pilloried by Senate test pilot - Civil Liberties Australia



from Cyber Security Dojo http://ift.tt/1Nekbjp

via IFTTT

CISA Isn't Cybersecurity, It's Cyber-Surveillance



from Cyber Security Dojo http://ift.tt/1CVdByV

via IFTTT

A security startup that reveals how secure your business partners are just raised $12.5 million...



from Cyber Security Dojo http://ift.tt/1N5CQjd

via IFTTT

Cybersecurity Information Sharing Bill Moves Forward | cyber security dojo



from Cyber Security Dojo http://ift.tt/1CVNpUL

via IFTTT

Protecting the data lode: NAIC addresses cybersecurity | cyber security dojo



from Cyber Security Dojo http://ift.tt/1Irgbvl

via IFTTT

Eze Castle Integration Earns UK Government Cyber Essentials Certification, Validating Company...



from Cyber Security Dojo http://ift.tt/1EOkbVl

via IFTTT

NCC agrees £55m deal for Accumuli | cyber security dojo



from Cyber Security Dojo http://ift.tt/1FTwOQx

via IFTTT

Business of cybersecurity focus of town hall event | cyber security dojo



from Cyber Security Dojo http://ift.tt/1BhnHnv

via IFTTT

Tennessee fights for its right to squash municipal broadband expansion



from Cyber Security Dojo http://ift.tt/1CVepE2

via IFTTT

Fleishman launches global cybersecurity and privacy practice | cyber security dojo



from Cyber Security Dojo http://ift.tt/1CVrJrT

via IFTTT

Leading Life Insurance Company Using EnCase® Security Products to Comply with PCI DSS | cyber...



from Cyber Security Dojo http://ift.tt/1CVmk48

via IFTTT

ALIBABA’S ISRAELI CYBERSECURITY CONNECTION | cyber security dojo



from Cyber Security Dojo http://ift.tt/1BgIdEY

via IFTTT

The Morning Download: Coca-Cola’s Security Experiment Could Pressure Firewall Makers | cyber...



from Cyber Security Dojo http://ift.tt/1CV1p0X

via IFTTT

Join Us in Shaping Technology, Strategy, Policy, and Cybersecurity at The Synergy Forum, April...



from Cyber Security Dojo http://ift.tt/1CURnNy

via IFTTT

In Washington, the Real Power Lies With the Spooks, Eavesdroppers and Assassins



from Cyber Security Dojo http://ift.tt/1xtH6Wi

via IFTTT

Monday 23 March 2015

STC2k Sonar virtualization technology



from Cyber Security Dojo http://ift.tt/1EGxVRW

via IFTTT

US to make weapons immune from cyber attacks | cyber security dojo



from Cyber Security Dojo http://ift.tt/1HuVa53

via IFTTT

FCC Communications Security, Reliability, and Interoperability Council Working Group Issues...



from Cyber Security Dojo http://ift.tt/1HuzG8r

via IFTTT

Four-year-old Flash bug returns from the dead | cyber security dojo



from Cyber Security Dojo http://ift.tt/1FvyD7y

via IFTTT

Scammers target WhatsApp voice calling | cyber security dojo



from Cyber Security Dojo http://ift.tt/1LP7hgr

via IFTTT

China’s Alibaba invests in funds of Israeli venture capital firm | cyber security dojo



from Cyber Security Dojo http://ift.tt/1DPEPH9

via IFTTT

Israel to host international Cybertech conference | cyber security dojo



from Cyber Security Dojo http://ift.tt/1Ci6Qov

via IFTTT

MIT launches three new cybersecurity initiatives | cyber security dojo



from Cyber Security Dojo http://ift.tt/1Ba8xAB

via IFTTT

CISA Further Threatens Consumer Privacy Online, Critics Say | cyber security dojo



from Cyber Security Dojo http://ift.tt/1FRAvpN

via IFTTT

Cyberattack hits NYPD union site | cyber security dojo



from Cyber Security Dojo http://ift.tt/1xVpAF0

via IFTTT

When Cybersecurity Meets Geopolitics | cyber security dojo



from Cyber Security Dojo http://ift.tt/1ChE73i

via IFTTT

When Does Online Fantasy Become Criminal Conspiracy?



from Cyber Security Dojo http://ift.tt/1N541cc

via IFTTT

Why Didn’t the FTC Charge Google with Antitrust Violations?



from Cyber Security Dojo http://ift.tt/1OqKciV

via IFTTT

US news website accuses Google of censorship over photos of Abu Ghraib, dead Ukrainians



from Cyber Security Dojo http://ift.tt/1On4sSG

via IFTTT

Documents Reveal Canada’s Cyber Arsenal - The Intercept



from Cyber Security Dojo http://ift.tt/1MZXukM

via IFTTT

Need a data center location? Iceland wants you



from Cyber Security Dojo http://ift.tt/1N4P8qk

via IFTTT

Saturday 21 March 2015

How two lawsuits could destroy Uber and Lyft's business models -- and set a precedent for the...



from Cyber Security Dojo http://ift.tt/1FTDOwZ

via IFTTT

Is a lifetime of involuntary GPS monitoring constitutional?



from Cyber Security Dojo http://ift.tt/19HgR46

via IFTTT

Anonymous - Web Warriors Full Documentary

The Only Blog You Need For Cyber Security News http://ift.tt/1F3mnuI

from Cyber Security Dojo http://ift.tt/1BjgZg0

via IFTTT

FAA plans new steps to speed up commercial drone use: sources



from Cyber Security Dojo http://ift.tt/1AS4DMo

via IFTTT

UK Police Deem Snowden Leak Investigation a State Secret - The Intercept



from Cyber Security Dojo http://ift.tt/1OdCN6G

via IFTTT

Washington, Alaska Lead Probe Into Hacking of Health Insurer | cyber security dojo



from Cyber Security Dojo http://ift.tt/1BhLGSC

via IFTTT

How To: Protect Your Smartphone from Hackers and other Threats | cyber security dojo



from Cyber Security Dojo http://ift.tt/1BhLDX4

via IFTTT

What Budget Cuts? Defense Stocks Are Still Strong | cyber security dojo



from Cyber Security Dojo http://ift.tt/1C9qFhK

via IFTTT

UK Government Admits Intelligence Services Allowed To Break Into Any System, Anywhere, For Any...



from Cyber Security Dojo http://ift.tt/1I8GoyC

via IFTTT

Malicious Mobility: Defend Against Rising Attacks | cyber security dojo



from Cyber Security Dojo http://ift.tt/1AVJykm

via IFTTT

‘Islamic State Hacking Division’ Posts Kill List With Purported Addresses of U.S. Military...



from Cyber Security Dojo http://ift.tt/1AVJykc

via IFTTT

Cybersecurity conference focuses on preventing threat of hackers | cyber security dojo



from Cyber Security Dojo http://ift.tt/1C9nxCu

via IFTTT

Netwars Brings Cyberterror to Life | cyber security dojo



from Cyber Security Dojo http://ift.tt/1Oi5KhJ

via IFTTT

CRITICS SAY FEDERAL CYBER SECURITY BILL ACTUALLY EXPANDS GOV’T SURVEILLANCE OF CITIZENS | cyber...



from Cyber Security Dojo http://ift.tt/1xKNNOj

via IFTTT

US Attorney to moderate cybersecurity, online crime discussion | cyber security dojo



from Cyber Security Dojo http://ift.tt/1Oi5HT2

via IFTTT

The NSA’s plan: improve cybersecurity by cyber-attacking everyone else | cyber security dojo



from Cyber Security Dojo http://ift.tt/1AVAfkq

via IFTTT

Abbott government and Labor reach deal on metadata retention laws



from Cyber Security Dojo http://ift.tt/1Ialejm

via IFTTT

China discloses cyberwarfare unit, no one surprised



from Cyber Security Dojo http://ift.tt/1CFuEVs

via IFTTT

Friday 20 March 2015

EXCLUSIVE INTERVIEW: Jailed hacker Guccifer boasts, "I used to read [Hillary's] memos for six,...



from Cyber Security Dojo http://ift.tt/1BX4hXx

via IFTTT

Executive Order 13636 - Why use NIST instead of US-CERT? • /r/cyberlaws



from Cyber Security Dojo http://ift.tt/1LCI5tx

via IFTTT

Whistleblowers Have a Human Right to a Public Interest Defense, And Hacktivists Do, Too



from Cyber Security Dojo http://ift.tt/1CEZo95

via IFTTT

Grindr Held Not Liable for Man's Liaison With Underage User



from Cyber Security Dojo http://ift.tt/1MVz4Hm

via IFTTT

Is Your Smartphone Making You Stupid?



from Cyber Security Dojo http://ift.tt/1ExZtGI

via IFTTT

Chinese military denies role in reported U.S. hacking



from Cyber Security Dojo http://ift.tt/1DEHuTJ

via IFTTT

We are Jameel Jaffer of the ACLU, Wikipedia founder Jimmy Wales, and Lila Tretikov, executive...



from Cyber Security Dojo http://ift.tt/1Gz8rG7

via IFTTT

Wired slams Senate’s cyber threat-sharing bill | cyber security dojo



from Cyber Security Dojo http://ift.tt/1C5Qmjh

via IFTTT

Cyber insurance in the spotlight: Senate mulling federal data breach protections | cyber...



from Cyber Security Dojo http://ift.tt/1AQ2vF0

via IFTTT

Met Police needs top cyber cop to lead fight against online crime | cyber security dojo



from Cyber Security Dojo http://ift.tt/1I4WcCq

via IFTTT

STRATHMORE UNIVERSITY, KENYA, HAS LAUNCHED A CYBER SECURITY MASTERS PROGRAMME | cyber security dojo



from Cyber Security Dojo http://ift.tt/1CBvOQb

via IFTTT

UK Cyber Security Biz Darktrace Wins $18m to Tap APAC | cyber security dojo



from Cyber Security Dojo http://ift.tt/1I4WcCd

via IFTTT

Senate Commerce, Science and Transportation Subcommittee on Consumer Protection, Product Safety,...



from Cyber Security Dojo http://ift.tt/1CBvRf1

via IFTTT

Walker wants agencies to review cybersecurity after attacks | cyber security dojo



from Cyber Security Dojo http://ift.tt/1CBrr7R

via IFTTT

Cybersecurity experts show concern over wearable security | cyber security dojo



from Cyber Security Dojo http://ift.tt/1I4SqsB

via IFTTT

Chinese military denies role in reported U.S. hacking | cyber security dojo



from Cyber Security Dojo http://ift.tt/1CBrr7M

via IFTTT

CISA SECURITY BILL: AN F FOR SECURITY BUT AN A+ FOR SPYING | cyber security dojo



from Cyber Security Dojo http://ift.tt/1I4Sqcd

via IFTTT

FAA Gives Amazon 'Experimental Airworthiness Certificate' To Test Drones



from Cyber Security Dojo http://ift.tt/1ANeGSW

via IFTTT

Cyber Attacks Upend Attorney-Client Privilege

Thursday 19 March 2015

How Google Skewed Search Results



from Cyber Security Dojo http://ift.tt/1OamirQ

via IFTTT

Harvard in the Sweet 16? Maybe If March Madness Was About Patents



from Cyber Security Dojo http://ift.tt/1GNlqnF

via IFTTT

‘You are surveillance target’ – Snowden to IT specialists



from Cyber Security Dojo http://ift.tt/1F9XSfw

via IFTTT

NSA Chief: U.S. Needs to Improve its Cyber Offense



from Cyber Security Dojo http://ift.tt/1O9Vacs

via IFTTT

automotiveIT Congress: The rising challenge of cyber security | cyber security dojo



from Cyber Security Dojo http://ift.tt/1AKDuLn

via IFTTT

REPORT: HILLARY USED LESS SECURE PERSONAL BLACKBERRY IN NATIONS THAT POSED INCREASED...



from Cyber Security Dojo http://ift.tt/1AKDw5R

via IFTTT

Drake State hosting cyber security conference | cyber security dojo



from Cyber Security Dojo http://ift.tt/1FJRv19

via IFTTT

Auconet Places in the Top 20% of the First Cybersecurity 500 Directory | cyber security dojo



from Cyber Security Dojo http://ift.tt/1H3WuYW

via IFTTT

Cybersecurity, Virtual Reality and Other Hot Sectors for Startup Investors | cyber security dojo



from Cyber Security Dojo http://ift.tt/1FJRvya

via IFTTT

GOP Senator: Net Neutrality 'Jeopardizes' Open Internet



from Cyber Security Dojo http://ift.tt/1Cxxo5K

via IFTTT

Here’s What a Former NSA Official Thinks About CISA | cyber security dojo



from Cyber Security Dojo http://ift.tt/1DCFLyg

via IFTTT

These 3 cybersecurity startups got money from a new TEDCO fund | cyber security dojo



from Cyber Security Dojo http://ift.tt/1H3S6Jr

via IFTTT

Cloud Security Specialist Joins Lockheed Martin Cyber Security Alliance | cyber security dojo



from Cyber Security Dojo http://ift.tt/1B5SjY0

via IFTTT

Wyndham: A Case Study in Cybersecurity: How the cost of a relatively small breach can rival that...



from Cyber Security Dojo http://ift.tt/1C0HUSp

via IFTTT

EPSRC and Innovate UK announce 5 million investment in UK cybersecurity research and innovation...



from Cyber Security Dojo http://ift.tt/1B5SjHz

via IFTTT

Fatally flawed RC4 should just die, shout angry securobods



from Cyber Security Dojo http://ift.tt/1FAZWfe

via IFTTT

Wednesday 18 March 2015

Obama administration sets record for censoring and denying transparency requests



from Cyber Security Dojo http://ift.tt/1bfAaSA

via IFTTT

Fear of Modernity and Technology Is Fueling a Return to Medievalism



from Cyber Security Dojo http://ift.tt/1AF8n3O

via IFTTT

UK Chancellor Says “Google Tax” On Diverted Profits To Come Into Effect Next Month



from Cyber Security Dojo http://ift.tt/1xeoCt0

via IFTTT

Are Cybersecurity Stocks Still Hot Or Lukewarm?

Last month, cybersecurity stocks emerged as some of the market’s top gainers.


They have since faded a bit, but watch this video as we check back in with Palo Alto Networks (NYSE:PANW), Vasco Data Security (NASDAQ:VDSI) and CyberArk Software (NASDAQ:CYBR) to see how they’re doing.


Source : http://ift.tt/1B0ebEj






from cyber security caucus http://ift.tt/1F3SLgJ

via IFTTT

Anonymous - THE FATE OF HUMANITY

For ALL things Cyber Security Protection check us out at http://ift.tt/1F3mnuI

from Cyber Security Dojo http://ift.tt/18DYZpP

via IFTTT

Businesses not heeding security warnings and the Internet of Things will make risks worse |...



from Cyber Security Dojo http://ift.tt/1F33kki

via IFTTT

Covenant Security Solutions, Inc. Named as Fellow by the Institute for Critical Infrastructure...



from Cyber Security Dojo http://ift.tt/1GodHfJ

via IFTTT

UAE users facing more cyber attacks | cyber security dojo



from Cyber Security Dojo http://ift.tt/1FBTCEc

via IFTTT

BDNA Expects 2015 to be a Crucial Year for Cybersecurity and Enterprise IT | cyber security dojo



from Cyber Security Dojo http://ift.tt/1x0lXCO

via IFTTT

Companies must become ‘cyber secure’ | cyber security dojo



from Cyber Security Dojo http://ift.tt/1GWUq5a

via IFTTT

Don’t overlook your biggest security flaw — your talent | cyber security dojo



from Cyber Security Dojo http://ift.tt/1x0lWys

via IFTTT

Banks struggle to keep up as cybersecurity risks increase | cyber security dojo



from Cyber Security Dojo http://ift.tt/1x0lWi3

via IFTTT

(ISC)²® Joins with Institute for Critical Infrastructure Technology (ICIT) as Fellow | cyber...



from Cyber Security Dojo http://ift.tt/191jQmG

via IFTTT

Security Think Tank: People and process remain the soft underbelly of banks | cyber security dojo



from Cyber Security Dojo http://ift.tt/1BU5bWd

via IFTTT

The need for information security innovation | cyber security dojo



from Cyber Security Dojo http://ift.tt/1GWL9tL

via IFTTT

Cybersecurity player Malwarebytes to create 50 jobs in Cork | cyber security dojo



from Cyber Security Dojo http://ift.tt/1GWLb50

via IFTTT

PNP urges PHL businesses to beef up cybersecurity | cyber security dojo



from Cyber Security Dojo http://ift.tt/1F2PoXA

via IFTTT

Government Is Crashing the Internet Party



from Cyber Security Dojo http://ift.tt/1ACGnOq

via IFTTT

Tuesday 17 March 2015

Class 11 student sent to jail for Facebook post against UP minister Azam Khan - The Times of India



from Cyber Security Dojo http://ift.tt/1Bv32LB

via IFTTT

Respect mah privacy! EU delegation begs US to play nice with data



from Cyber Security Dojo http://ift.tt/1ATvNSe

via IFTTT

Is using encryption suspicious? Half of Americans say yes, according to Pew.



from Cyber Security Dojo http://ift.tt/1CsymSm

via IFTTT

France To Require Internet Companies To Detect 'Suspicious' Behavior Automatically, And To...



from Cyber Security Dojo http://ift.tt/1ATbzIc

via IFTTT

Rich kids use the Internet to get ahead, and poor kids use it ‘mindlessly’



from Cyber Security Dojo http://ift.tt/1GSCXdW

via IFTTT

China put its crackdown on foreign tech companies on hold—for now | cyber security dojo



from Cyber Security Dojo http://ift.tt/18Xlzth

via IFTTT

SEC Releases Results of Cybersecurity Exam Sweep | cyber security dojo



from Cyber Security Dojo http://ift.tt/1ATWW7H

via IFTTT

Cybersecurity expert on local website hackings | cyber security dojo



from Cyber Security Dojo http://ift.tt/1wVO1He

via IFTTT

Bjorn Lynne - Can I just state publicly that I hate Universal...



from Cyber Security Dojo http://ift.tt/18C9jyD

via IFTTT

Bangladeshi hackers take over Shashi Tharoor’s official website, target Team India | cyber...



from Cyber Security Dojo http://ift.tt/1GRmpTz

via IFTTT

Vietnam telecom giant VNPT sees 50,000 customer accounts hacked | cyber security dojo



from Cyber Security Dojo http://ift.tt/1MIXa7X

via IFTTT

N Korea accused of hacking nuke plants | cyber security dojo



from Cyber Security Dojo http://ift.tt/1wVgNYy

via IFTTT

IT firm baits hackers with online train set | cyber security dojo



from Cyber Security Dojo http://ift.tt/1GQTjUv

via IFTTT

Arab nations to discuss cyber-security on 29-30 March | cyber security dojo



from Cyber Security Dojo http://ift.tt/1MIz9Ov

via IFTTT

Monday 16 March 2015

Get to know the 2015 Federal 100 winners -- FCW



from Cyber Security Dojo http://ift.tt/1Gg0zcG

via IFTTT

Is China the Biggest Thief in Cyberspace?



from Cyber Security Dojo http://ift.tt/1FrQc7d

via IFTTT

Book Review of Data and Goliath by Bruce Schneier



from Cyber Security Dojo http://ift.tt/1EWG6fL

via IFTTT

Paris Joins April And Strengthens Its Commitment To Free Software | April



from Cyber Security Dojo http://ift.tt/1AvOfB6

via IFTTT

No “underboob selfies” Thai military leaders tell citizens



from Cyber Security Dojo http://ift.tt/19t0aJC

via IFTTT

Pew Finds Third Of Americans Have Made Privacy Changes, Post-Snowden



from Cyber Security Dojo http://ift.tt/1Eqvpzf

via IFTTT

Facebook Report: Slight Rise in Government Data Requests - India Gazette



from Cyber Security Dojo http://ift.tt/1AvtfKJ

via IFTTT

Will Low Oil Prices Prompt Cutbacks in Cybersecurity Spending? | cyber security dojo



from Cyber Security Dojo http://ift.tt/1AwzxK6

via IFTTT

Cuba has allowed the launch of the country's first free, public Wi-Fi



from Cyber Security Dojo http://ift.tt/18p0Oqh

via IFTTT

MSPBanter: Kaspersky Lab on Cybersecurity, Antivirus and More | cyber security dojo



from Cyber Security Dojo http://ift.tt/1BMzq19

via IFTTT

QR Codes Become Cheap Cybersecurity Applications

QR — or quick response — codes are widely used for marketing, connecting customers to information online via a smartphone scan, for example. Barcodes and QR codes are also used to identify a computer chip. To protect data on a chip, researchers at the University of Connecticut (US) are proposing the integration of an optical mask with these codes and to encrypt information using quantum imaging. Thus, if pirates were to produce a counterfeit product using identical codes, they would also need access to these optical masks for authentication.


To optically encode an QR code, the scientists place a phase mask, potentially as simple as Scotch tape, on top of a QR code. “Using a laser, we can then illuminate the QR code, which will produce a unique pattern,” explains Dr Bahram Javidi, professor in the electrical and computer engineering department at Connecticut. “If there is no phase mask, a different pattern would be produced.” The mask scrambles the QR code design into a random mass of black-and-white pixels. The optically encoded QR code is verified through the optical mask’s signature via statistical analysis.


Eventually, this advanced 3D optical masking method combined with extremely low-light photon counting encryption could transform ordinary QR codes into a high-end cybersecurity application that would be extremely difficult to duplicate. The right key not only authenticates a chip but also reveals detailed information about that chip and its specifications.


Unlike commercial QR codes, Javidi’s advanced versions can be scaled as small as microns or a few millimeters and could replace the electronic part number that is currently stamped on most microchips.


“Our proposed method allows for a non-invasive approach to authenticating an object,” Javidi points out, adding that his team is currently unaware of any comparable security practices that involve placing an optical phase mask on a barcode or a QR code with the encrypted information.


Being able to simply scan an optically encoded QR code with a laser could become a cheap and quick way to authenticate an object. The light technology is also non-invasive and does not damage the product.


Although Javidi says the method does not prevent tampering of an object, it could make it easier for a company or manufacturer to identify a counterfeit product. Furthermore, the technique could find employment beyond QR codes, e.g., in medication and consumer goods.


Source: http://ift.tt/1Cm0Nj7






from cyber security caucus http://ift.tt/1Cm0PHW

via IFTTT

Yahoo makes passwords ‘on demand’ | cyber security dojo



from Cyber Security Dojo http://ift.tt/1MF2v1X

via IFTTT

Make Hackers’ Jobs Harder | cyber security dojo



from Cyber Security Dojo http://ift.tt/1ANqvYx

via IFTTT

Advancing Information Sharing: Radware Joins The Lockheed Martin Cyber Security Alliance | cyber...



from Cyber Security Dojo http://ift.tt/1BM8YVx

via IFTTT

Silk Road moderator “Samesamebutdifferent” pleads guilty, faces life in prison



from Cyber Security Dojo http://ift.tt/1Fmjyne

via IFTTT

The National Security Agency and Department of Homeland Security Recognize Colorado Technical...



from Cyber Security Dojo http://ift.tt/1MFHbrn

via IFTTT

Cyber-Security Is Center Stage

CertainSafe Recognized Within CyberSecurity 500: Top 500 Security Companies to Watch in 2015 |...



from Cyber Security Dojo http://ift.tt/1GLVjNS

via IFTTT

Senate Intelligence Committee Approves “a Surveillance Bill by another Name” | cyber security dojo



from Cyber Security Dojo http://ift.tt/1bbMXFH

via IFTTT

Beam me up, Robin. MP takes cyber security trip with city firm | cyber security dojo



from Cyber Security Dojo http://ift.tt/1MEV76W

via IFTTT

Thursday 12 March 2015

Hacking Fears Boost Cyber Security Shares

One of the most watched industries this year has been cyber security as several high-profile cyber attacks have drawn attention to the fact that hackers seem to be one step ahead of the programs protecting companies’ data.


Not only have private firms been spending more on new security tools to keep their customer data safe, but cyber security businesses are also being granted large government contracts in order to thwart hacking attacks from foreign countries as well.


Threats Rise


On Wednesday, a survey showed that security threats against American, British and Canadian companies are quickly rising and businesses are struggling to keep up.


The move toward cloud-based computing has created an entirely new range of cyber security threats that most firms are not prepared to deal with.


Additionally, a lack of training among employees has made it easier for hackers to get inside company databases through workers’ personal phones and computers.


Investors Get On Board


Investors have also taken notice of the industry setting shares of cyber security companies on fire over the past couple months. FireEye Inc. FEYE 2.38% saw its fourth quarter revenue jump by 150 percent last year and shares of CyberArk Software Ltd CYBR 6.98% have increased by more than 40 percent so far this year.


A relatively new ETF has emerged in the sector called PureFunds Cyber Security HACK 0.94% in order to give investors a way to play the sector as a whole; FireEye, CyberArk and Infoblox Inc. BLOX 1.7% make up the fund’s largest holdings.


Related Link: How Contract Management Helps Hedge Against Financial Services Cyber Threats


A Bubble About To Burst?


Many worry that the recent rise in cyber security share prices can’t be sustained. However, some analysts say the rise has been warranted as the firms aren’t just trading on headlines.


The hacking attacks like those carried out at Sony Inc. SNE 1.08% and Anthem Inc. ANTM 2.13% not only dominated the news, but genuinely boosted security firms’ balance sheets.


FireEye was hired by both companies to clean up the aftermath of the attacks, while other firms saw an influx of new corporate customers looking to prevent similar situations.


Also, with more and more businesses taking their data online, the threat of a breach is set to keep rising— making the demand for security firms likely to continue.







from cyber security caucus http://ift.tt/1ArvLAU

via IFTTT

The reason companies don’t fix cybersecurity