cybersecurity
Cracking the cyber world: NSA, hackers, and the complicated ways that digital information can threaten our personal lives, politics and national security.
China's success as an ill omen for Europe.
A still-thriving authoritarian society that follows a capitalist economic model, and it is currently considered to be the second-largest economy in the world.That could easily be a definition in a lexicon of modern geopolitics .Even though China is still facing many ethical and existential issues, like environmental catastrophes and emissions that are causing pollution, as well as issues that many other authoritarian or even liberal states are facing, like the oppression of speech, minority marginalization and terrible working conditions.
By Sergios Saropoulos2 years ago in The Swamp
How Cyber Security Has Changed in the Last 10 Years
The world has changed drastically over the past ten years. Even the last two years have shown us so much change, not all of it for the better. When it comes to technology, ten years may as well be a hundred, for it changes so rapidly.
By Andrew Obuchowski2 years ago in The Swamp
Hacker
A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term hacker has become associated in popular culture with a security hacker – someone who utilizes their technical know-how of bugs or exploits to break into computer systems and access data which would otherwise be unavailable to them – hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques in order to collect evidence on criminals and other malicious actors. This could include using anonymity tools (such as a VPN, or the dark web) to mask their identities online, posing as criminals themselves.[1][2] Likewise, covert world agencies can employ hacking techniques in the legal conduct of their work. Oppositely, hacking and cyber-attacks are used extra- and illegally by law enforcement and security agencies (conducting warrantless activities), and employed by State actors as a weapon of both legal and illegal warfare.Definitions
By Rebecca Maria2 years ago in The Swamp
How To Tell If Your Company Needs To Boost Its Security Measures
We all collectively know that the most valuable asset to any company is the information that we possess. Not only that, but how data flows through the company has to have the most up-to-date security possible. Security is an absolute necessity in the world of technology information. Here are a couple of signs that your company needs to boost its security measures.
By Louis Barani2 years ago in The Swamp
Information Warfare is a Cybersecurity Thing. Duh!
Duh! That’s what we say when something should be obvious. It turns out, information warfare is at the heart of cybersecurity. But the cybersecurity community and I missed it. This Computer Weekly article from Dec. 23, 2020 brought it into focus. And the US Capitol fiasco on Jan. 6, 2021 vaulted information warfare to the top of the priority list. We need a solution and root cause analysis. Fast.
By Greg Scott3 years ago in The Swamp
TrickBot appears as UAE’s top malware threat
Check Point Research, the Threat Intelligence arm ofCheck Point® Software Technologies Ltd. has published its latest UAE Threat Index for January 2021. Researchers found that banking trojan Trickbot impacted 7% of organizations in the UAE, while the Emotet trojan which has remained in first place in the top malware list globally for a second month running impacting 6% of businesses in the UAE.
By TECHx Media3 years ago in The Swamp
We should follow Sweden in combatting foreign interference in our democratic proceedings.
Since the Cold War, it has become notably evident that Russian interference over democratic proceedings has increased. During my course in Government & Politics A-Level, I have taken a particular interest in the argument over whether there is a democratic deficit within the European Union. A key idea for this, would be that as Russia has increasingly interfered within democratic elections of European states, how is it possible to unify the European Union when elections themselves are not fully democratic? Such a question pushed me forward to read more about this topic, where I became fascinated by Russian espionage attempts to undermine democratic proceedings. I consider this to be one of the leading global issues we have, and this has become exacerbated by the fact that it is a threat that is continuously increasing. However, I believe that recent tactics used by Sweden should act as an example to ensure a comprehensive approach to combatting foreign interference in democracy.
By Ewan Wilson4 years ago in The Swamp
Security Nightmare: US Lawmakers May Force Companies To Create Backdoors In Software/Hardware...
It's so strange how both parties seem to magically come together for the worst things. But apparently nothing unites a usually broken system more than when they need to vote on going to war, or to step on the right of citizens with bills like the Patriot Act, and now, the 'EARN IT Act', which has been officially submitted by Senators Lindsey Graham (R) and Richard Blumenthal (D).
By Ross Davis4 years ago in The Swamp
Johnny’s Data Diving Part 1: New York Firm Law360 Leaks Israeli Intelligence’s Personal Data
I was searching for potential sex offenders when I stumbled across an interesting data leak. An accounts executive for a New York legal advisory firm, Law360, had opened up her hard drive by not being more careful with which folders she was sharing, a common problem in the modern digital world. I began downloading the various Law360 contracts and other personal data and putting them in secure folders. Of late, I have my eyes peeled for any companies who fail in their legal duty to protect their customers and employees personal data and a legal firm responsible for the leaking was irresistibly ironic. This would be the 2nd large company who I had compromised in a matter of days. These are the types of companies where the lower paid employees would be fired for leaking data, but where the higher paid executives and managers live by different rules.
By Johnny Vedmore4 years ago in The Swamp
The Internet Is a Lie
Welcome to the Age of Misinformation. In the days leading up the United Kingdom’s 2016 vote on Brexit, it became increasingly clear to British authorities that a foreign national had interfered with the referendum through a tactical social media attack. The foreign national, using social media data gathered from a third party statistics company, had spread misinformation about the vote using automated social media accounts (bots). The foreign country wanted to advance its own interest by dividing the United Kingdom amongst political lines while also advancing policies that softened British policy towards the foreign actor. If this at all sounds familiar, it is. The same thing happened in the 2016 United States election. The same country, Russia, perpetrated the act of interference. And yet Russia does not deserve 100% of the blame.
By Matthew Williams5 years ago in The Swamp