- The WIP hosted #LocalVoicesTalk about Women in Islam, a Twitter event. July 22, 2014
- Infrastructure Hackers, Script Kiddies and “Watchdogs”: A Round-up of Monsters Under the Bed from CIS/MS-ISAC June 5, 2014
- Recent Activity from The European Cyber Army (ECA) April 15, 2014
- Summary of 2013 Malware Development March 26, 2014
- Turkey Thrashes Twitter, Leaks put Gov in a Twist March 21, 2014
- Commerce Dept. Cans ICANN March 21, 2014
- Point of Sale Target’ed, Millions of Credit Cards Scraped. February 12, 2014
- Hotels May Become New Data Breach Point February 12, 2014
- New White House Initiative Pledges $750 Million for Student Technology February 12, 2014
- Mask/Careto Unmasked, Shadowy Spanish Spybots Slink into Sunset February 12, 2014
Posts by Benjamin Volcsko
Intelligence Analysis, the threat monitor for Recorded Future, detailed recent attacks and events linked back to The European Cyber Army (ECA) in a recent article. The group has also been linked to several campaigns against U.S. banks in recent months. … Continue reading
HackSurfer just released a summary on malware development for 2013 based on the formal report from Panda Labs. Here are some of the key points from the summary: Almost 32% of computers across the world found infected with malware. There were … Continue reading
Russia Crowdsourcing It’s Cyber Security Strategy: Clever Experiment or Solicitation of Internet Restriction Freedoms?
On November 29, 2013 the Federation Council (CF) of the Russian Federation held parliamentary hearings on the draft of the Concept of Russia’s Cyber Security Strategy. Participants of the hearing, recognizing the significant security implications of the proposed cyber security … Continue reading
Since February of last year when the Mandiant Report was released, China has been at the forefront of cyber security news. It has become apparent that the PRC is waging all-out economic warfare through the use of widespread cyber espionage, … Continue reading
Brazil is often known for its coastal beauty but sadly it should also be recognized for its prolific cyber security concerns. According to Symantec, Brazil is listed as number 7 on their list of countries with the biggest cybercrime problems. … Continue reading
The National Institute of Standards and Technology just released an article about how Quantum Physics might allow us to start using secure, single-use computer passwords. There are a lot a wild claims that are circulating with our approach to full-scale … Continue reading
Here is a write-up for one of cyber security’s most important contributors, Dr. John Arquilla. Dr. John Arquilla is professor of defense analysis at the U.S. Naval Postgraduate School, author of Insurgents, Raiders, and Bandits: How Masters of Irregular Warfare … Continue reading
Just in time for your holiday shopping, we are pleased to announce the Highlands Group 2013 Reading List. Each year the Highlands Group present a list of books that we would like to call to your attention as being noteworthy. … Continue reading
DARPA, as expected, is coming up with many new and inventive ways of trying to rethink the cyber security challenges that DOD is plagued with. First they have developed a series of free computer and mobile app based games that, … Continue reading
NASA developed an advanced robot known as Valkyrie that competed in DARPA’s 2013 Robotics Challenge Trial. DARPA hosted the robot challenge at the Florida’s Homestead Miami Speedway this past December. Eight teams were selected to participate in a series of … Continue reading
As Unmanned Aerial Vehicles (UAVs) continue to advance and play an ever growing role in modern warfare, could cyber vulnerabilities pose a potential pitfall? With drone technology rapidly advancing and allowing for the production of truly autonomous UAVs, concerns over … Continue reading
The U.S.’s International Strategy for Cyberspace, released in 2011.
Russia’s Information Security Doctrine, released in 2000.
Spain’s Cyber Security Strategy, released in 2013.
There has been much discussion about 3-D printers lately. Although 3-D printer technology is still in the early stages, many security experts believe that advanced, large-scale 3-D printers will likely revolutionize the battlefield, if not the world. Robert Beckhusen of … Continue reading
Bruce Schneier, the Chief Technology Officer of Co3 Systems and well-known security blogger, offers his two-cents on modern day security concerns for today’s interconnected world of computers. His article raises a lot of good questions and identifies some of the key … Continue reading
Techday IT news published this article on their predictions for cyber trends to look for in 2014. We will see how good their crystal ball skills really are. – by Ben Volcsko, Research Assistant
If you were curious about how to take on an APT, check out this summary by Gartner, Inc., a private information technology research company. Released in September 2013, this report’s recommendations are short, sweet and informative. – by Ben Volcsko, Research Assistant
The Australian Strategic Policy Institute (ASPI) produced a great report on the People’s Republic of China’s cyber intelligence capabilities. Titled Enter the Cyber Dragon: Understanding Chinese Intelligence Agencies, this report is a great starting point for getting a grip on what the … Continue reading
An excellent article by Michael J. Holt, a Professor of Criminal Justice at Michigan State University, detailing the intersection of cybercrime and terrorism. As we know, criminals and terrorist share many commonalities, differing primarily in their motivation. However when it … Continue reading