Trust is a tricky thing. It’s hard to gain, easy to lose, and exceptionally difficult to win back. Following the Edward Snowden disclosures and ongoing wrangling in Congress and the courts about privacy, monitoring, and data collection, trust b…
8 retweets 5 favorites
Recently, I wrote about the three vectors of a healthcare cyber attack.
http://www.youtube.com/v/SlDzkCdV5r0?version=3&f=user_uploads&app=youtube_gdata The original article/video can be found at Sandbox Evasion identifying advanced threats designed to avoid detection
The latest big budget release out of Hollywood takes on the very lucrative world of blackhat hacking with the appropriately named, “Blackhat”. Fortinet sponsored theaters around North America for a sneak peak at the movie and a look at h…
The FBI has provided more evidence : Speaking at a Fordham Law School cybersecurity conference Wednesday, Comey said that he has “very high confidence” in the FBI’s attribution of the attack to North Korea. And he named several of the sources of his evidence, including a “behavioral analysis unit” of FBI experts trained to psychologically analyze foes based on their writings and actions. He also said that the FBI compared the Sony attack with their own “red team” simulations to determine how the attack could have occurred