Distributed Denial of Service Attacks (DDoS) explained

Posted by & filed under Cybersecurity, Denial of service.

A distributed denial of service (DDoS) attack is an attempt to take a website offline by overwhelming it with internet traffic. The tactic is often used in protest against companies and organisations to make their websites unavailable. Source: BBC Technology News Date: September 22nd, 2016 Link to video: http://www.bbc.com/news/technology-35731734 Discussion 1) Have you seen a completely non-tech version… Read more »

How I caught my online scammer – and Facebooked his mum

Posted by & filed under App Economy, bitcoin, Cybersecurity.

A cybersecurity researcher living in Austria who was scammed out of $500 says his money was returned after he tracked down the scammer’s family and contacted them on Facebook. Source: BBC Technology Date: September 14th, 2016 Link: http://www.bbc.com/news/technology-37348014 Discussion 1) “He had decided to accept payment in the digital currency as he thought it would be less of… Read more »

Thailand’s students reveal their vice — cheating by device

Posted by & filed under Competitive advantage, Cybersecurity, Ethical Issues, fraud.

  This is a confiscated smartwatch showing a student’s math data.  In Thailand, being brought up to be polite, tolerant, and respectful hasn’t prevented rampant cheating on university entrance exams, now aided by embedded cameras, smartwatches and all other manner of high tech gear. Source: Toronto Star Date: September 1st, 2016 Link: https://www.thestar.com/business/tech_news/2016/05/11/thailands-students-reveal-their-vice-cheating-by-device.html 1) How might you prevent… Read more »

Who are the hackers who cracked the iPhone?

Posted by & filed under Civil Liberties, Competitive advantage, Cybersecurity.

  The cyber arms NSO Group was founded in 2010 and is based in Herzliya, an attractive city north of Tel Aviv that is known as being a cluster of tech start-ups. The group was likely funded by the elite 8200 Intelligence Unit, an Israeli military-funded scheme for start-ups. Source: BBC Technology Date: September 1st, 2016 Link: http://www.bbc.com/news/technology-37192670… Read more »

Counter-counter hacking

Posted by & filed under Business Intelligence, Civil Liberties, Cybersecurity.

  The whistleblower Edward Snowden believes Russia is behind a leak of malware allegedly belonging to the US National Security Agency (NSA).  Hackers calling themselves Shadow Brokers started an auction for the malware last week.  The malware is used by the NSA to attack or counter-attack in cyberspace. Source: BBC Technology Date: August 17th, 2016 Link: http://www.bbc.com/news/technology-37104745 Discussion… Read more »