Week 8 Link Dump

CPNI has launched six short, animated films that convey key personnel security messages:

https://www.youtube.com/user/UKCPNI

Cyber security expert Eugene Kaspersky says cyber ‘hactivists’ the greatest threat at next year’s G20 Summit:

http://www.heraldsun.com.au/news/national/cyber-spies-lead-g20-security-threat/story-fnii5v70-1226648659868

The Former CIA Officers, Analysts, and Intelligence Professionals Who You Should Be Following on Twitter:

http://blogsofwar.com/2013/05/23/the-former-cia-officers-analysts-and-intelligence-professionals-that-you-should-be-following-on-twitter/

Military strategies and tactics that may work in the physical world do not have a place in guiding “cyberwarfare”, and those that attempt to use them demonstrate a key lack of understanding:

http://www.zdnet.com/us-government-has-no-idea-how-to-wage-cyberwar-ranum-7000015840/

Iranian-backed hackers have escalated a campaign of cyberassaults against U.S. corporations by launching infiltration and surveillance missions against the computer networks running energy companies:

http://www.iranfocus.com/en/index.php?option=com_content&view=article&id=27691:iran-hacks-energy-firms-us-says

Using automated hacking tools, NSA cyberspies pilfer 2 petabytes of data every hour from computers worldwide……:

http://www.businessweek.com/articles/2013-05-23/how-the-u-dot-s-dot-government-hacks-the-world

The bad news is most IT security professionals haven’t developed the necessary skills to communicate effectively with non-technical executives:

http://www.darkreading.com/management/security-pros-fail-in-business-lingo/240155523

This paper will dig into the seedy underbelly of the phishing trade, starting with an explanation of how large-scale phishers operate:

https://securosis.com/assets/library/reports/Securosis_Email-basedThreatIntelligence_FINAL.pdf

Identify Back Doors in Firmware By Using Automatic StringAnalysis:

http://blog.ioactive.com/2013/05/identify-back-doors-in-firmware-by.html

Malware Similarity and Clustering Made Easy:

http://www.slideshare.net/SilvioCesare/simseercom-malware-similarity-and-clustering-made-easy

Leave a Comment

Your email address will not be published.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top