Investigative reporter for CBS News continues to fight government electronic surveillance

Posted by & filed under Censorship, Civil Liberties, Cyberforensics, Cybersecurity, Electronic Surveillance, IT and Politics.

As an investigative reporter for CBS News, Ms. Attkisson was responsible for investigating and reporting on national news stories. Between 2011 and 2013, she investigated and prepared various high-profile news reports, including ones related to the “Fast and Furious” “gunwalking” operation and the attack on the American diplomatic mission in Benghazi, Libya… In 2011——at the… Read more »

Smart TV hack embeds attack code into broadcast signal—no access required

Posted by & filed under Cyber attack, Cybersecurity, Ethical Issues.

A new attack that uses terrestrial radio signals to hack a wide range of Smart TVs raises an unsettling prospect—the ability of hackers to take complete control of a large number of sets at once without having physical access to any of them. The proof-of-concept exploit uses a low-cost transmitter to embed malicious commands into… Read more »

How much do you know about cybersecurity?

Posted by & filed under Cybersecurity.

Test your knowledge on cybersecurity topics and terms by taking our 10-question quiz. Then see how you did in comparison with a nationally representative group of 1,055 randomly selected adult internet users surveyed online between June 17 and June 27, 2016. The survey was conducted by the GfK Group using KnowledgePanel. When you finish, you… Read more »

4 myths — and facts — about online security

Posted by & filed under Cybersecurity.

Use strong passwords and don’t go to sketchy websites, and you’ll protect yourself online, right?  Well… That’s a good start. But it’s not quite that simple. Source: CNN Money Date: March 28th, 2017 Link: http://money.cnn.com/2017/03/22/technology/cybersecurity-misconceptions-pew/index.html?iid=ob_homepage_tech_pool Discussion 1) Why is cybersecurity so difficult? 2) Shouldn’t most of the things that make us secure online be just built into the… Read more »

WikiLeaks Reveals How the CIA Can Hack a Mac’s Hidden Code

Posted by & filed under Apple, Civil Liberties, Cybersecurity, Electronic Surveillance.

IF THE CIA wants inside your Mac, it may not be enough that you so carefully avoided those infected email attachments or maliciously crafted web sites designed to plant spyware on your machine. Based on new documents in WikiLeaks’ ongoing release of CIA hacking secrets, if Langley’s hackers got physical access, they still could have… Read more »

Who is Karim Baratov, the alleged Canadian Yahoo hacker?

Posted by & filed under Cybersecurity, Ethical Issues, FaceBook.

The FBI alleges that 22-year-old Karim Baratov, from Ancaster, Ont., was one of four men connected with a series of cyberattacks carried out on Yahoo that began in early 2014. But you wouldn’t know it from Baratov’s online persona. On Instagram, Baratov presents himself as a high-end car enthusiast. He has frequently posted pictures of Aston Martins, Audis, Mercedes and BMWs, among other… Read more »

Smart machines v hackers: How cyber warfare is escalating

Posted by & filed under Artificial intelligence, Cybersecurity, Emerging Technologies.

There is a gaping hole in the digital defences that companies use to keep out cyber thieves. The hole is the global shortage of skilled staff that keeps security hardware running, analyses threats and kicks out intruders.  Currently, the global security industry is lacking about one million trained workers, suggests research by ISC2 – the industry… Read more »

WikiLeaks Releases Trove of Alleged C.I.A. Hacking Documents

Posted by & filed under Cybersecurity, Ethical Issues, IT and Politics.

Wikileaks recently released thousands of documents that it said described sophisticated software tools used by the CIA to break into smartphones, computers and even Internet-connected televisions. Source: New York Times Date: March 7th, 2017 Link: https://www.nytimes.com/2017/03/07/world/europe/wikileaks-cia-hacking.html?action=Click&contentCollection=BreakingNews&contentID=64996424&pgtype=Homepage&smid=fb-nytpolitics&smtyp=cur&_r=0 Discussion 1) “The WikiLeaks release said that the CIA has managed to bypass encryption on popular phone and messaging services.”  Does this… Read more »

Dropbox Didn’t Actually Delete Your ‘Deleted’ Files

Posted by & filed under Cloud Computing, Cybersecurity, Ethical Issues, Privacy.

Dropbox recently restored years-old “deleted” files for some customer accounts by accident, drawing attention to a potential privacy problem.  Files supposedly deleted by customers from the company’s servers were instead retained for as long as eight years, according to several reports over the past few weeks. The company apologized for what it has described as… Read more »

Canadian energy firms at risk from cyber, bomb attacks: CSIS

Posted by & filed under Cyber attack, Cybersecurity.

Canada’s main spy agency last year warned energy companies about an increasing risk of cyber espionage and attacks on pipelines, oil storage and shipment facilities and power transmission towers using homemade explosives, according to a classified document obtained by Reuters.  The Canadian Security Intelligence Service warning last May highlights an additional risk for the energy… Read more »