Link Dump 10

The American Civil Liberties Union (ACLU) has released details of an investigation showing how U.S. law enforcement and other agencies exceed their powers in the name of homeland security –

Time has come for ensuring that our intelligence gathering systems factor in the Kenyan realities of corruption, tribalism and the manual nature of our criminals –

In Part 1 of our C3CM discussion we established that, when applied to the practice of combating bots and APTs, C3CM can be utilized to identify, interrupt, and counter the command, control, and communications capabilities of our digital assailants –

Taiwan’s National Centre for High-Performance Computing (NCHC) has launched what it claims to be the world’s first free malware database designed to help businesses, academics and researchers better identify and defend against criminally-coded attacks –

Eight men have been arrested in connection with a £1.3m theft by a gang who took control of a Barclays Bank computer –

Below is a comprehensive list of spy tactics that every American executive and in-house counsel should be familiar with –

A new security survey indicates that IT decision makers are not feeling totally secure in their security strategies –

Why do Internet criminals favor small and medium sized businesses? One reason is because many are suppliers and partners of large corporate entities offering a convenient pathway to these partners’ networks –

Twitter has transformed people’s response to crimes and how they engage with authorities like the police –

An international team of researchers may have upped the ante on hardware-based attacks. In a recently published paper, they describe how they are able to modify a circuit with malware and yet, to detection mechanisms, the circuit appears to be pristine –

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top