Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Microsoft inches closer to commercially-viable quantum computing

Microsoft’s quest to create a powerful quantum computer comes closer to reality with the help of an elementary particle.


Cobalt/Carbanak bank malware gang’s alleged leader arrested

These ...

Continue Reading →
0

Sunday Funnies – Major Attorney Fails

We have more attorneys per person in America than any other country on the planet.  This causes problems, because there are too many attorneys chasing too few ambulances, and not enough real attorney work to go around.  It has long been my contention that the attorneys we elect to public office, in the Legislatures, Courts, and Executive branches of our governments are the ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Happy St Patrick’s Day

Saint Patrick’s Day, or the Feast of Saint Patrick  is a cultural and religious celebration held on 17 March, the traditional death date of Saint Patrick (c. AD 385–461), the foremost patron saint of Ireland.


Critical Flash update. Patch now!

Can you ...

Continue Reading →
0

A History of Cyber Warfare – Part 3

Today we finish our story on the history of cyber warfare.

Edward Snowden (May 2013)

Attributed to Edward Snowden.  The target was the National Security Agency of the United States.  Snowden was a former CIA employee, who, while working for Booz Allen Hamilton as a contractor to the NSA, copied and leaked NSA information, particularly the computer exploits that the NSA used abroad and in ...

Continue Reading →
0

A History of Cyber Warfare – Part 2

Today we continue our report on the history of cyber warfare.

Stuxnet or Olympic Games (2009-2010)

Cyber attack attributed to the United States, Israel, Germany, and possibly Great Britain.  Confirmed by General James Cartwright in November 2012.  Target was Iran, particularly the Nuclear Program facility at Natanz.  The excellent documentary Zero Days covers this operation in detail.

Since the Natanz facility was not connected ...

Continue Reading →
0

A History of Cyber Warfare – Part 1

Cyberwarfare is becoming a more prevalent form of cyber-attack, and one that may be hard for an individual or a small business owner to understand or defend against.  Of Friday we took a look at the definition and practice of cyber war.  This week we will review the history cyberwar incidents, the attackers, the targets, and the outcome of the best known cyberwarfare ...

Continue Reading →
0

When is a Cyber Attack an Act of Cyber War?

What is a cyber warfare attack exactly, and what is it that separates it from a garden variety cyber attack?  When does a cyber attack cross the line into actual warfare?  Is it a cyber attack launched by a nation-state or other political or quasi-political entity against the resources of another nation-state?  What separates cyber war from actual armed conflict?  The answers are surprising.

I ...

Continue Reading →
0

Do You Accept Credit Cards? How Credit Card Breaches Happen

If your business accepts credit cards for payment, then your a subject to the regulations of the Payment Card Industry.  This is known as PCI-DSS Compliance.  PCI compliance company Security Metrics recently released an infographic that shows the main compliance failures that lead to credit card breaches in 2017.  Here are some of the startling take-aways:

  • Businesses that took credit cards ...
Continue Reading →
0

Congress Acts To Secure Electronic Voting Machines

As long as we are on the subject of election rigging and tampering, it is notable that Congress has finally weighed in on the subject of insecure and hackable electronic voting machines.  According to a recent TechDirt article, “A new bipartisan bill has been introduced, called the Secure Elections Act, that would actually target ...

Continue Reading →
0
Page 1 of 8 12345...»