Yahoo: How do state hackers break in?

Posted by & filed under cyber war, Cyberforensics, Cybersecurity.

Yahoo has revealed that login details for up to one billion accounts have gone missing.  The massive breach was discovered while it investigated a separate attack that had compromised data on about 500 million accounts. Yahoo said it suspected a state-sponsored attacker was involved in both thefts.  How can it be sure? Source: BBC Technology News Date: December… Read more »

The Hackers Fighting ISIS You’ve Never Heard of

Posted by & filed under cyber terroism, cyber war, Digital Policy, ethics, hackers, Privacy, Security.

Description: Ghost Security Group, also known as GhostSec, is small hacker army composed of ex-military and ex-Anonymous members fighting ISIS online. Source: CNN Money Date: November 20, 2015 Ghost Security Group is a counter terrorism network that combats extremism on the digital front lines of today using the internet and social media as a weapon. Questions for… Read more »

Google’s data mining raises questions of national security

Posted by & filed under Analytics, cloud services, cyber war, data analytics, data mining, Data storage, Digital Policy, Security.

Description: Free cloud service providers collect and store massive amounts of personal data. While this data is usually well-protected and secure, given the right incentive, there is no question that hackers could compromise the security of even the largest cloud service providers. So what are governments doing to protect their sensitive data? Source: TheGuardian  Date: October 15,… Read more »

Social media bears witness in Syria

Posted by & filed under Blackberry, Cloud Computing, cyber war, exam2012A, social impacts, Social Media, streaming video.

Description: Two CNN assignment editors discuss how important the activist network is for us to cover the story in Syria. Source: cnn .com Date: March 15, 2012 Questions for discussion: Has social media been a positive force in what is going on in Syria?  Why? Or Why Not? Is there anyway in which the government… Read more »

Hackers learn to ditch black hats for white collar security jobs

Posted by & filed under cyber terroism, cyber war, EXAM ARTICLE, hackers.

Description: Computer hacking has always been a pursuit driven more by geeky passion than a quest for profits. But it is now becoming a pathway to earning serious money. Source: globeandmail.com Date: Oct 10, 2011 A decade ago, a skilled hacker who discovered a software security flaw had two choices: he could tell the company… Read more »

Social Media Scrutiny after UK riots

Posted by & filed under Business Intelligence, cyber terroism, cyber war, Digital Policy, Social Media.

Description: Source:   British Prime Minister David Cameron suggested that the government should impose limits on the “free flow of information” when it’s “used for ill.” “When people are using social media for violence, we need to stop them,” he said then. Source: CNN.com Date: Sept 8, 2011 “Instead of detailing plans to block criminals’ access to… Read more »

Google, Twitter help give voice to Egyptians

Posted by & filed under cyber terroism, cyber war, digital divide, Digital Policy, IS ethics, Social Media, Uncategorized, wireless networks.

Description: CNN’s Josh Levs talks about how technology plays a part in protests around the world Source: CNN.com Date: Jan 29, 2011 Last week, as demonstrators angry with the policies of Egyptian President Hosni Mubarak took to the streets, the government shut down social-media websites, then blacked out all internet access in much of the country. On… Read more »