cyb

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyb

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyb

A Crime Wave in Cyberspace

Listen to the chatter from top officials, and you’d think that World War III was about to break out on the Internet. The defense secretary is warning about a digital “Pearl Harbor.” Former director of national intelligence Mike McConnell declares that the United States is “fighting a cyber war, and we’re losing.” Every new hack brings more pronouncements of network doom.

The scare talk, however, is misplaced. Yes, we’re facing enormous cybersecurity problems — just look at the high-profile penetrations of such companies as Sony and Lockheed or the millions of Americans whose personal information has been stolen online.

But these aren’t signs of some impending cataclysmic showdown as I explain in my new cybersecurity paper for The Brookings Institution. They’re markers of a rising tide of online crime that, in its own way, could be more dangerous than a cyberwar. According to the British government, online thieves, scammers and industrial spies cost U.K. businesses an estimated $43.5 billion in the past year alone. Crooks-for-hire will infect a thousand computers for $7 — that’s how simple it’s become. Sixty thousand new malicious software variants are detected every day. Forget “Pearl Harbor”; if we’re not careful, the Internet could be in danger of looking like the South Bronx circa 1989 – a place where crooks hold such sway that honest people find it hard to live or work there.

Could there be some online conflict in the future? Maybe. But crooks are draining billions from the legitimate global economy right now. Even the Pentagon’s specialists are worried, noting in their new cybersecurity strategy that “the tools and techniques developed by cyber criminals are increasing in sophistication at an incredible rate.”

Those tools also are becoming easier to use. The latest crimeware makes stealing passwords about as simple as setting up Web pages. One gang, recently arrested, used it to drain $9.5 million in just three months.

Read the full article at washingtonpost.com >>

Authors

Publication: The Washington Post
      
 
 




cyb

Cyber runs: How a cyber attack could affect U.S. financial institutions

Cyber risks to financial stability have received significant attention from policy makers. These risks are worsened by the increasing diversity of perpetrators—including state and non-state actors, cyber terrorists, and “hacktivists”—who are not necessarily motivated by financial gain. In fact, for some actors, the potential of exploiting a cyber event to inject systemic risk into our…

       




cyb

Waging (cyber)war in peacetime

Editor’s note: In this post, the second in a series drawing from Fergus Hanson's new book, "Internet Wars: The Struggle for Power in the 21st Century," Hanson makes the case that the United States has a strong interest in leading a more robust global discussion on cyberwarfare as cyberattacks in times of peace increase. A…

       




cyb

Norms of cyberwar in peacetime

Editor’s Note: Cyberattacks and the appropriate response are new territories in national security. While most attacks do little damage and their perpetrators are often unclear, the potential risk is growing. Fergus Hanson unpacks the cyber threat and offers his thoughts on how to best respond. This post originally appeared on Lawfare.  Cyberattacks regularly make the headlines.…

       




cyb

Will Sharing Cyberthreat Information Help Defend the United States?

On Tuesday January 13th, 2015, the White House published several legislative proposals concerning cybersecurity. The purpose of one of the initiatives is to “codify mechanisms for enabling cybersecurity information sharing between private and government entities, as well as among private entities, to better protect information systems and more effectively respond to cybersecurity incidents.” How should…

       




cyb

What are the prospects for the Cyber Threat Intelligence Integration Center?

Last week we learned that the federal government plans to create a Cyber Threat Intelligence Integration Center (CTIIC). There is some confusion about the purpose of this agency, especially as it relates to the National Cybersecurity and Communications Integration Center (NCCIC) and the United States Computer Emergency Readiness Team (US-CERT). While I am not a…

       




cyb

New cybersecurity mantra: “If you can’t protect it, don’t collect it”

In early August I attended my 11th Black Hat USA conference in sunny Las Vegas, Nevada. Black Hat is the somewhat more corporate sibling of the annual DEF CON hacker convention, which follows Black Hat. Since my first visit to both conferences in 2002, I’ve kept tabs on the themes expressed by computer security practitioners.…

       




cyb

Outside perspectives on the Department of Defense cyber strategy

Chairman Thornberry, Ranking Member Smith, members of the Committee, thank you for the opportunity to testify. I am Richard Bejtlich, Chief Security Strategist at FireEye. I am also a nonresident senior fellow at the Brookings Institution, and I am pursuing a PhD in war studies from King’s College London. I began my security career as…

       




cyb

Cyber Grand Challenge contrasts today’s cybersecurity risks

Cade Metz’s article for Wired titled “Hackers Don’t Have to Be Human Anymore. This Bot Battle Proves It” described a curious event that took place in Las Vegas on August 4, 2016. The first Defense Advanced Research Projects Agency (DARPA) Cyber Grand Challenge witnessed seven teams compete for cyber security supremacy. Unlike traditional hacking contests,…

       




cyb

New "Cyborg" Yeast Can Be Controlled By Computer

A breakthrough in controlling yeast with computers gives a glimpse at where science is headed with controlling lifeforms.




cyb

Tweetable, Interactive Algae Farm is Energy-Generating "Cyber-Garden" (Photos)

This fascinating installation where algae, bioluminescent bacteria, humans and smartphones interact may chart where a new generation of urban "cyber-gardeners" may go.




cyb

One In Five Canadians Crossing the Border To Get Into the Black Friday/ Cyber Monday Madness

It's one thing to drive to the mall, but one fifth of Canadian shoppers are driving to another country. That's crazy.




cyb

Cyborg bacteria turn carbon dioxide into chemicals and fuels with zero waste

Forget about Tony Stark or the Bionic Man, the real cyborg action starts with microscopic swamp creatures






cyb

'It was suddenly Cyber Monday' — Etsy CEO says sales spiked 79% in April

"When the CDC changed its [face mask] guidelines ... we all of a sudden saw overwhelming amounts of demand come on to our site," Etsy CEO Josh Silverman told CNBC.




cyb

Financial advisors need to put cybersecurity plans to the test

Today's advisory firms face numerous cybersecurity risks, from phishing to ransomware to email viruses, to name a few. And the one way that firms can tell if they're ready to face these risks, as well as regulators' requirements, is to put them to the test.






cyb

soooo cyber

Today on Toothpaste For Dinner: soooo cyber






cyb

Ananya Panday and The Vamps' James McVey to get vocal on cyber bullying

In a first of its kind international venture, youth icons Ananya Panday and international songwriter and guitarist from The Vamps band - James McVey - are all set to come together on the former’s ‘So Positive’ platform to raise awareness about social media bullying. The live session will be hosted on 8th May 2020 at 7 pm.

James McVey, the lead guitarist, and songwriter of the internationally renowned British band The Vamps, is known globally for spreading social media positivity. The coming together of the two, Panday and McVey, marks a collaboration that goes beyond the confines of language and geography to attain more awareness on the issue. The statistics are proof of how teenagers and children are the most affected in this digital era. The number of platforms accessible to the population across the world are increasing with every passing day. This collaboration would be extremely insightful in terms of shedding light on this issue and help individuals dealing with social media bullying.

Sharing his experience James McVey said, “During this difficult time we find ourselves using social media more than ever. When I was at the receiving end of bullying I felt isolated and alone. Regardless of where you live or your background, it’s important to remember that you are never alone. Millions of others are going through the same traumatic experience and I believe together we further the conversation and join the fight to end bullying. I’m looking forward to speaking with Ananya on ‘So Positive’ to learn more about her experiences.”

Ananya Panday shares, "Social media bullying is an evil that people face every day on the numerous platforms that they use in their daily lives. I’m glad that James McVey and I will be fighting this evil together in our own small way. The world is going through a difficult time, currently and it is even more important than ever to be kind to everyone around and spread positivity. So Positive has been creating awareness through different ways and our aim continues to be to negate the spread of social media bullying by spreading positivity all across. I’m really looking forward to this insightful exchange with James”.

So Positive is a cause taken up by Ananya which is backed with substantial data, research, and behavioural statistics. The initiative aims at creating and spreading awareness about social media bullying. Its prime focus is to make people aware of the fact that this issue exists and stays very prevalent in society. Also, the steps that can be taken by the recipients of this destructive criticism in order to deal with this.

ALSO READ: Ananya Panday says Vijay Deverakonda is humble and grounded despite being a huge star




cyb

Software defends against cyberattacks on energy grids

An EU-funded project is developing software designed to prevent, detect and act on cyberattacks on smart meters in big infrastructure installations, boosting the security of our power supplies.




cyb

Mindfulness Meditation Enhances Positive Effects of Psilocybin: Study

Mindfulness meditation was found to enhance the positive long-term effects of a single dose of psilocybin, which is found in certain mushrooms, revealed University of Zurich researchers.




cyb

Twitter Hands More Power To Users To Stop Cyberbullying

In a fresh bid to empower its over 300 million users, the micro-blogging website Twitter on Wednesday made it easier for them to report cyberbullying.




cyb

Supporting an effective cyber insurance market

13/05/2017 - With the frequency and scope of cyber incidents growing significantly, this report provides an overview of the market for cyber insurance as well as the current challenges in terms of data availability, quantification of cyber risks, awareness and misunderstanding about coverage. It identifies potential policy measures to address some of the main challenges to the development of an effective cyber insurance market.




cyb

Enhancing the role of insurance in cyber risk management

This report provides a series of policy recommendations aimed at enhancing the contribution of the cyber insurance market to managing this increasingly prevalent risk. The report examines the current state of the market and the obstacles that are impeding the market from reaching its full potential




cyb

The cyber insurance market: Responding to a risk with few boundaries

With the growth of cybercrime, and intensive media coverage of privacy breaches and ransomware attacks over the last year, could complacency about cyber risks soon be a thing of the past? Bill Below and Leigh Wolfrom of the OECD Directorate for Financial and Enterprise Affairs look at some of the challenges to insuring cyber risk.




cyb

Conference on unleashing the potential of the cyber insurance market

22-23 February 2018, Paris - The potential role of the nascent cyber insurance market in enhancing cyber resilience is increasingly being recognised by policy makers. This conference provided an opportunity to exchange knowledge and share experiences on addressing the challenges impeding the development of the cyber insurance market.




cyb

From balcony concerts to cyber drinks — the power of ritual in the corona age

Under lockdown, communities are finding new ways to voice their defiance, anger and support




cyb

Dtex, a specialist in insider threat cybersecurity, raises $17.5M

A lot of enterprise cybersecurity efforts focus on malicious hackers that work on behalf of larger organizations, be they criminal groups or state actors — and for good reason, since the majority of incidents these days come from phishing and other malicious techniques that originate outside the enterprise itself. But there has also been a […]




cyb

Dtex, a specialist in insider threat cybersecurity, raises $17.5M

A lot of enterprise cybersecurity efforts focus on malicious hackers that work on behalf of larger organizations, be they criminal groups or state actors — and for good reason, since the majority of incidents these days come from phishing and other malicious techniques that originate outside the enterprise itself. But there has also been a […]




cyb

Cyber threats keeping Australian insurers up at night - 31 Aug

Cyber risk, political interference, and macro-economic volatility rank among the top sources of anxiety for Australian insurers, according to a joint PwC and Centre for Financial Innovation (CSFI) report released today.




cyb

Australia Tops Asian Region for Cyber Security Risks: Report - 21 Oct

The number of detected cyber security incidents in Australia was the highest worldwide in the last 12 months with an increase of 109 percent, compared to a 38.5 percent increase globally.




cyb

In cyber Commons, Jeremy Corbyn is back where he belongs... and new boy Keir Starmer plays a blinder

HENRY DEEDES: There is a fairground spookiness to Parliament (pictured) at the moment. Most areas are boarded up or deserted.




cyb

TOM LEONARD: Billionaires engulfed in cyber hacking sensation

TOM LEONARD: As a titan of Silicon Valley, Jeff Bezos should probably have known the first rule of internet security - never click on anything sent to you by someone you don't know.




cyb

Cyber security experts say there is not conclusive proof Saudi Arabia hacked Jeff Bezos

Forensics specialists Bill Marczak and Alex Stamos told The Wall Street Journal that the team at FTI should have been able to identify the malicious software that was used in the apparent hack.




cyb

The Voice's Lucy Sugerman talks about being cyber-bullied

She is the youngest vocalist ever to make it to The Voice's finale and Lucy Sugerman has opened up about being cyber-bullied by fans of the show questioning her place among the final four.




cyb

Elon Musk says the new Tesla Roadster is on the way, but the Model Y and Cybertruck must come first

Tesla will make the Cybertruck and ramp up Model Y production before moving to the $200,000 Roadster, CEO Elon Musk said. The topic came up on Joe Rogan's podcast, where Musk appeared this week for his second guest appearance. There's no clear date on when to expect the Roadster.Visit Business Insider's homepage for more stories.In a Thursday podcast with Joe Rogan, popular guest and Tesla CEO Elon Musk said the company is prioritizing its other planned cars over the $200,000 Tesla Roadster sports car. Rogan asked Musk when he'd be able to purchase a Roadster, as reported by Reuters, but Musk didn't have a date. Instead, Musk said increasing production of the Model Y midsize SUV and the building of a Gigafactory in Berlin, Germany, were his priorities. "This COVID thing's kind of thrown us




cyb

Jorge Masvidal hits back at Conor McGregor for 'cyberbully' behaviour

The reason for Masvidal tweeting that he isn't a 'bully' is because he believes McGregor is just a 'cyberbully' and doesn't actually want to fight him, despite the Irishman having called him out.




cyb

Cyber criminal, 29, faces jail for using hacking program

Anwar Batson, 29, of Notting Hill, West London, used a hacking program called 'Sentry MBA' while carrying out the offences. He admitted four charges at Southwark Crown Court today.




cyb

How Saudi cyber chief spent years acquiring hacking tools thought to have been used on Bezos

Saud al-Qahtani, the former head of cybersecurity in Saudi Arabia, is thought to have spent years acquiring hacking tools for the state, including a $55m purchase from NSO Group in 2017.




cyb

Rob Kardashian and Blac Chyna 'set to be sued for $2million by ex Pilot Jones in cyberbullying case'

Rob Kardashian and Blac Chyna are reportedly being sued for over $2million (£1.6million) following their alleged cyberbullying of her ex Pilot Jones




cyb

Chinese official who gatecrashed government meeting to praise Beijing was a top cyber spy

Long Zhou used to work in a secretive cyber cell inside the Chinese Communist Party, helping it wage war against western governments and pump out propaganda.




cyb

How China 'used Word document to launch potentially devastating cyber-attack' on Western Australia

The report by Israeli cyber-security company Check Point said hackers known as Naikon targeted a worker in the office of the Western Autralian premier.




cyb

Family blames teen's suicide on cyber-bullying and claims he was outed as gay online

Channing Smith, 16, killed himself on Sunday night at his home in Tennessee after sexually explicit messages outing him as gay were shared by people known to him on social media.




cyb

Larry Emdur gets Elon Musk's Cybertruck as a birthday present

While most people would be happy with an iPhone for their birthday, Larry Emdur is receiving a new electric Tesla Cybertruck.