Huawei is ‘growing astronomically’ despite allegations it spies for China

Posted by & filed under cyber war, Cybersecurity.

The arrest of Huawei’s chief financial officer is just the latest controversy to hit the tech giant which has been accused of conducting espionage activities for the Chinese government. “We don’t know to what extent they might be considered an arms length business and to what extent they might be simply an arm of the Chinese government,”… Read more »

How the Dutch foiled Russian ‘cyber-attack’ on OPCW

Posted by & filed under cyber war, Cybersecurity, Ethical Issues, hackers.

Four Russians, a car full of electronic equipment, and a foiled plot to hack the world’s foremost chemical weapons watchdog. The Dutch security services say Russia planned a cyber-attack on the Organisation for the Prevention of Chemical Weapons (OPCW) in The Hague earlier this year. At a press conference on Thursday, Defence Minister Ank Bijleveld… Read more »

Yahoo: How do state hackers break in?

Posted by & filed under cyber war, Cyberforensics, Cybersecurity.

Yahoo has revealed that login details for up to one billion accounts have gone missing.  The massive breach was discovered while it investigated a separate attack that had compromised data on about 500 million accounts. Yahoo said it suspected a state-sponsored attacker was involved in both thefts.  How can it be sure? Source: BBC Technology News Date: December… Read more »

The Hackers Fighting ISIS You’ve Never Heard of

Posted by & filed under cyber terroism, cyber war, Digital Policy, ethics, hackers, Privacy, Security.

Description: Ghost Security Group, also known as GhostSec, is small hacker army composed of ex-military and ex-Anonymous members fighting ISIS online. Source: CNN Money Date: November 20, 2015 Ghost Security Group is a counter terrorism network that combats extremism on the digital front lines of today using the internet and social media as a weapon. Questions for… Read more »

Google’s data mining raises questions of national security

Posted by & filed under Analytics, cloud services, cyber war, data analytics, data mining, Data storage, Digital Policy, Security.

Description: Free cloud service providers collect and store massive amounts of personal data. While this data is usually well-protected and secure, given the right incentive, there is no question that hackers could compromise the security of even the largest cloud service providers. So what are governments doing to protect their sensitive data? Source: TheGuardian  Date: October 15,… Read more »

Social media bears witness in Syria

Posted by & filed under Blackberry, Cloud Computing, cyber war, exam2012A, social impacts, Social Media, streaming video.

Description: Two CNN assignment editors discuss how important the activist network is for us to cover the story in Syria. Source: cnn .com Date: March 15, 2012 Questions for discussion: Has social media been a positive force in what is going on in Syria?  Why? Or Why Not? Is there anyway in which the government… Read more »

Hackers learn to ditch black hats for white collar security jobs

Posted by & filed under cyber terroism, cyber war, EXAM ARTICLE, hackers.

Description: Computer hacking has always been a pursuit driven more by geeky passion than a quest for profits. But it is now becoming a pathway to earning serious money. Source: globeandmail.com Date: Oct 10, 2011 A decade ago, a skilled hacker who discovered a software security flaw had two choices: he could tell the company… Read more »