If You Connect It, Protect It

Keeping our connected devices secure has become easier – and harder!  Easier because we have more tools to defend our online assets, and harder because the opposition has grown much larger and become more sophisticated.  And the enemy is not limited to criminals, there are terrorist groups, nation-state sponsored cyber operations teams, hacktivists, and other with malicious intent and nefarious schemes.

When I started writing this blog in October 2006, almost 2000 ...

Continue Reading →
0

A History of Cyber Warfare – Part 3

Today we finish our story on the history of cyber warfare.

Edward Snowden (May 2013)

Attributed to Edward Snowden.  The target was the National Security Agency of the United States.  Snowden was a former CIA employee, who, while working for Booz Allen Hamilton as a contractor to the NSA, copied and leaked NSA information, particularly the computer exploits that the NSA used abroad and ...

Continue Reading →
0

Should You Use Domain Privacy?

I will start out by admitting that I hate Domain Privacy.  But I just read a story in Naked Security on February 9th that is causing me to reevaluate my opinion.  It turns out that the new White House press secretary, Sean Spicer, has a personal website at www.seanspicer.com.   The website has been turned into a private site, but the WHOIS ...

Continue Reading →
0

Cybersecurity and the Elections

election-hackedIn the last several days, we have seen big distributed denial of service (DDoS) attacks against DynDNS, an Internet services company that provides domain name services (DNS) to many companies including Twitter and PayPal.  DNS is how web sites are found on the web, you enter a web address in your browser, and DNS finds the website you are looking for.  When attacked in ...

Continue Reading →
0

What is The Dark Web?

dark-web-1When I am doing a cybersecurity presentation, someone is bound to ask about the Dark Web.  What is it, exactly, and how does someone get there?  The how part we discussed on Friday.  Linux Tails is a great tool for accessing and browsing the Dark Web, should you be so inclined.  Before we delve into the Dark Web, let’s talk about the different parts of the web.

  • The Clear Web – ...
Continue Reading →
0

Use Linux Tails for Privacy

Linux-TailsYou don’t need to be a journalist, freedom fighter, or living under an oppressive political regime to have the desire for some online privacy.  Maybe you are trying to put the contents of your life back into the Pandora’s box you opened when you signed up on Facebook.  Maybe you would like a little privacy in your online life.

Linux Tails is ...

Continue Reading →
0

Using Your Phone For Video Surveillance

smartphone-videoI discovered a while ago that my LG smart phone can be used fairly easily to make a surreptitious video of a meeting simply by turning on the video camera and slipping the phone into a shirt pocket.  The camera lens clears the edge of the pocket nicely, and there is no indication, at least on my phone, the the camera is rolling.  This is a great way to keep a record ...

Continue Reading →
0

Is Hacktivism A Good Thing?

hacktivistHacktivism is an electronic form of civil disobedience.  These cyber-attacks are instigated for reasons that are political, economic, or based in civil rights, liberty, freedom, or social justice.  In nearly every case, these attacks are illegal.  But does that make them a bad thing?

As the saying goes, “one man’s terrorist is another man’s freedom fighter.”  Looking back on our own national history, the men who we fondly refer to as ...

Continue Reading →
0

Anonymous Declares War on ISIS

anonymous-isis-550Can we stop calling this terrorism, and call it what it is – warfare!

The day after ISIS claimed responsibility for the acts of war carried out in Paris by trained members of the ISIS military, members of the hacker collective Anonymous declared war on ISIS.

“On Friday 13 November our country France was attacked in Paris for two hours, by multiple ...

Continue Reading →
0