Organizations often allow the use of social media on their networks, but RSAC is buzzing about the risks. Does your organization allow employees to access social media at the office? Many do, whether for strictly personal use, communication, collabo…
Paul Krugman argues that we’ll give up our privacy because we want to emulate the rich, who are surrounded by servants who know everything about them: Consider the Varian rule , which says that you can forecast the future by looking at what the rich have today — that is, that what affluent people will want in the future is, in general, something like what only the truly rich can afford right now. Well, one thing that’s very clear if you spend any time around the rich — and one of the very few things that I, who by and large never worry about money, sometimes envy — is that rich people don’t wait in line
New research: Max Abrahms and Philip B.K. Potter, ” Explaining Terrorism: Leadership Deficits and Militant Group Tactics ,” International Organizations . Abstract : Certain types of militant groups — those suffering from leadership deficits — are more likely to attack civilians.
Both the mainstream media and our security media is abuzz with Kasperksys disclosure of their research on the Equation group and the associated malware. You can find the original blog post here: http://www.kaspersky.com/about/news/virus/2015/equation-group-the-crown-creator-of-cyber-espionage But if you want some real detail, check out the Q http://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf Way more detail, and much more sobering to see that this group of malware goes all the way back to 2001, and includes code to map disconnected networks (using USB key CC like Stuxnet did), as well as the disk firmware facet thats everyones headline today.
Anonymous browsing with Tor presents serious challenges for IT as well as possible opportunities for organizations that need it. One of my best friends growing up was named Tor. He was Norwegian through and through and looked like he could wield a…
Among the events of the past few days during the holidays was a DDoS attack on Sonys Playstation network and on Xbox Lives network. The attack was reportedly carried out by a group called Lizard Squad and by all measures is not precisely the profile of a highly sophisticated attack.
This is a guest diary submitted by Brad Duncan. For the past year or so, Ive noticed a particular group using a gate that redirects to an exploit kit (EK), usually Fiesta