Yahoo has revealed that login details for up to one billion accounts have gone missing. The massive breach was discovered while it investigated a separate attack that had compromised data on about 500 million accounts. Yahoo said it suspected a state-sponsored attacker was involved in both thefts. How can it be sure? Source: BBC Technology News Date: December… Read more »
Posts Categorized: cyber war
Description: Ghost Security Group, also known as GhostSec, is small hacker army composed of ex-military and ex-Anonymous members fighting ISIS online. Source: CNN Money Date: November 20, 2015 Ghost Security Group is a counter terrorism network that combats extremism on the digital front lines of today using the internet and social media as a weapon. Questions for… Read more »
Description: Free cloud service providers collect and store massive amounts of personal data. While this data is usually well-protected and secure, given the right incentive, there is no question that hackers could compromise the security of even the largest cloud service providers. So what are governments doing to protect their sensitive data? Source: TheGuardian Date: October 15,… Read more »
Description: CNN’s Rene March reports on why there is a shortage of cyber security experts Source: CNN .com Date: April 24, 2012 Questions for discussion: 1. Why is cyber security such a great area in which new grads can find jobs?
Description: Two CNN assignment editors discuss how important the activist network is for us to cover the story in Syria. Source: cnn .com Date: March 15, 2012 Questions for discussion: Has social media been a positive force in what is going on in Syria? Why? Or Why Not? Is there anyway in which the government… Read more »
Description: Computer hacking has always been a pursuit driven more by geeky passion than a quest for profits. But it is now becoming a pathway to earning serious money. Source: globeandmail.com Date: Oct 10, 2011 A decade ago, a skilled hacker who discovered a software security flaw had two choices: he could tell the company… Read more »
Description: CNN’s Dan Simon pays a visit to a U.S. government lab that protects the nation from cyber-terrorism. Source: CNN .com. Date: Oct 1, 2011 Questions for discussion: What do you feel are the major risks from cyber terrorism in your geographic area? How should Canada best prepare for cyber war attacks?
Source: Ted.com. Date: July, 2011 Questions for discussion: Is this technical threat a manageable risk for the modern organization? How would one manage theses risks 2. Should this threat be managed by governments or by the private sector? Why?
Description: Source: British Prime Minister David Cameron suggested that the government should impose limits on the “free flow of information” when it’s “used for ill.” “When people are using social media for violence, we need to stop them,” he said then. Source: CNN.com Date: Sept 8, 2011 “Instead of detailing plans to block criminals’ access to… Read more »
Description: CNN’s Josh Levs talks about how technology plays a part in protests around the world Source: CNN.com Date: Jan 29, 2011 Last week, as demonstrators angry with the policies of Egyptian President Hosni Mubarak took to the streets, the government shut down social-media websites, then blacked out all internet access in much of the country. On… Read more »