Assessing and managing the risk of lone-actor terrorism is a challenge, as events around the world continue to show. In… Read more Analysing Lone-Actor Terrorism In Context
Category: Uncategorized
Before Connecting an IoT Device, Check Out a New NIST Report for Cybersecurity Advice | NIST
From the National Institute of Standards and Technology: Seemingly every appliance we use comes in a version that can be… Read more Before Connecting an IoT Device, Check Out a New NIST Report for Cybersecurity Advice | NIST
Operationalizing Cyberspace as a Military Domain: Lessons for NATO | RAND
The authors of this Perspective review the new security challenges NATO faces and discuss current efforts by NATO to consider… Read more Operationalizing Cyberspace as a Military Domain: Lessons for NATO | RAND
New Yorker who tried to join ISIS sentenced to 20 years in prison
A New York man who attempted to join the Islamic State was sentenced to 20 years in prison after he… Read more New Yorker who tried to join ISIS sentenced to 20 years in prison
Cyber Actors Exploit ‘Secure’ Websites In Phishing Campaigns
Warning: Just because you see the green lock and “https” in the URL does NOT mean it’s 100% secure. Always… Read more Cyber Actors Exploit ‘Secure’ Websites In Phishing Campaigns
ALL THE WAYS GOOGLE TRACKS YOU—AND HOW TO STOP IT
The best way to minimize the chances of your personal data being hacked/leaked is to limit the amount that is… Read more ALL THE WAYS GOOGLE TRACKS YOU—AND HOW TO STOP IT
Windows 10 is a step closer to never needing passwords
“People don’t like passwords because we have to remember them. As a result, we often create passwords that are easy… Read more Windows 10 is a step closer to never needing passwords
In a first, Israel responds to Hamas hackers with an air strike | ZDNet
Israel’s response against Hamas marks the first time that a country has reacted with immediate military force to a cyberattack… Read more In a first, Israel responds to Hamas hackers with an air strike | ZDNet
Asynchronous Warfare part 3: How Conventional Strategies and Tactics Are Applied to Cyberwarfare
While the threat of militarized terrorism is important to monitor (i.e. lone wolves and sleeper cells), the larger threats to… Read more Asynchronous Warfare part 3: How Conventional Strategies and Tactics Are Applied to Cyberwarfare
Hacker Finds He Can Remotely Kill Car Engines After Breaking Into GPS Tracking Apps
By reverse engineering ProTrack and iTrack’s Android apps, L&M said he realized that all customers are given a default password… Read more Hacker Finds He Can Remotely Kill Car Engines After Breaking Into GPS Tracking Apps
You must be logged in to post a comment.