Link Dump 10

The American Civil Liberties Union (ACLU) has released details of an investigation showing how U.S. law enforcement and other agencies exceed their powers in the name of homeland security – http://www.homelandsecuritynewswire.com/dr20130925-more-americans-see-their-electronic-equipment-seized-by-dhs-at-the-border

Time has come for ensuring that our intelligence gathering systems factor in the Kenyan realities of corruption, tribalism and the manual nature of our criminals – http://www.nation.co.ke/oped/blogs/dot9/What-is-the-nature-of-our-Intelligence-System/-/1959700/2003546/-/ixi52gz/-/index.html

In Part 1 of our C3CM discussion we established that, when applied to the practice of combating bots and APTs, C3CM can be utilized to identify, interrupt, and counter the command, control, and communications capabilities of our digital assailants – http://holisticinfosec.org/toolsmith/pdf/september2013.pdf

Taiwan’s National Centre for High-Performance Computing (NCHC) has launched what it claims to be the world’s first free malware database designed to help businesses, academics and researchers better identify and defend against criminally-coded attacks – http://focustaiwan.tw/search/201308290029.aspx?q=filipino

Eight men have been arrested in connection with a £1.3m theft by a gang who took control of a Barclays Bank computer – http://www.bbc.co.uk/news/uk-england-24172305

Below is a comprehensive list of spy tactics that every American executive and in-house counsel should be familiar with – http://www.internationalbusinesslawadvisor.com/2013/09/articles/intellectual-property/spies-lies-and-secrets-37-industrial-espionage-tactics-that-threaten-to-kill-your-international-business/

A new security survey indicates that IT decision makers are not feeling totally secure in their security strategies – http://www.techrepublic.com/blog/tech-decision-maker/what-security-issues-keep-it-decision-makers-up-at-night/

Why do Internet criminals favor small and medium sized businesses? One reason is because many are suppliers and partners of large corporate entities offering a convenient pathway to these partners’ networks – http://www.business2community.com/small-business/small-biz-5-step-plan-security-breach-recovery-0621838

Twitter has transformed people’s response to crimes and how they engage with authorities like the police – http://www.demos.co.uk/files/_metpoliceuk.pdf?1371661838

An international team of researchers may have upped the ante on hardware-based attacks. In a recently published paper, they describe how they are able to modify a circuit with malware and yet, to detection mechanisms, the circuit appears to be pristine – http://threatpost.com/researchers-develop-undetectable-hardware-trojans

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top