cyber security

Some interesting stuff that I found online:

 

Now you can find my stories also on medium.com. Check them at https://medium.com/@tofandan

 

SECURITY:

The big hack – the unbelievable story of how China spied US through some tiny chips – https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies

Tim Berners Lee on a decentralized platform designed to give every internet user full control over their data: Solid (Social Linked Data) – https://www.techspot.com/amp/news/76691-inventor-internet-has-unveiled-plan-new-secure-internet.html

The Five Eyes — the group of the rich English-speaking countries (the US, Canada, the UK, Australia, and New Zealand) — issued a statement  where they claim that “privacy is not absolute”and the need “for surveillance outweigh everyone’s needs for security and privacy” (B. Schneier) – https://www.homeaffairs.gov.au/about/national-security/five-country-ministerial-2018/access-evidence-encryption

https://www.schneier.com/blog/archives/2018/09/five-eyes_intel.html

https://www.lawfareblog.com/five-eyes-statement-encryption-things-are-seldom-what-they-seem

About how we won’t win the online security war without people power – https://www.weforum.org/agenda/2018/09/we-won%27t-win-the-online-security-war-without-people-power/

2018 US Department of Defence Cyber Strategy – https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF

Improving cyber security through quantum technology – https://medium.com/quantonation/how-to-improve-cybersecurity-through-quantum-technology-487f95c60731

 

SOCIAL:

A view on the end of social media – https://medium.com/futuresin/2018-is-the-end-of-social-media-as-we-know-it-1e5658f41a5

On the 50 mil. users Facebook leak – https://www.technologyreview.com/the-download/612218/how-to-know-if-youre-affected-by-the-facebooks-massive-data-breach

 

TECHNOLOGY:

Wi-Fi Alliance introduces Wi-Fi 4,5,6 – https://www.wi-fi.org/news-events/newsroom/wi-fi-alliance-introduces-wi-fi-6

 

Quote of the day: “A mind is like a parachute. It doesn’t work if it is not open.” – Frank Zappa (American musician)

Newsletter 15 – October 05, 2018

Some interesting stuff that I found online:   Now you can find my stories also on medium.com. Check them at https://medium.com/@tofandan   SECURITY: The big hack – the unbelievable story of how China spied US through some tiny chips – https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies Tim Berners Lee on a decentralized platform designed to give every internet user full […]

Read more

Newsletter 12, August 23, 2018

Now you can find my stories also on medium.com. Check them at https://medium.com/@tofandan   Some interesting stuff that I found online: SECURITY: My last article on the history of cyber security and how it become a “thing” – https://medium.com/@tofandan/how-did-cyber-security-become-a-global-issue-and-what-is-to-be-done-about-it-b6f2643e14b1 Microsoft’s Defending Democracy Program offers state-of-the-art cybersecurity protection at no extra cost to all candidates and […]

Read more

How did cyber security become a global issue, and what is to be done about it?

  In the last two decades, one term has become very popular by attaching itself onto many traditional terms related to war, terrorism, security, in order to express the many implications of technological development in our everyday life. “Cyber security” belongs to a wide family of modern terms inspired by the multidisciplinary science called cybernetics. […]

Read more

Newsletter 11, August 2, 2018

Some interesting stuff that I found online:   Now you can find me also on medium.com. Check all my stories at https://medium.com/@tofandan   SECURITY: A short summary on US cyber security relevant legislation – https://blog.appknox.com/a-glance-at-the-united-states-cyber-security-laws/ EU Commission July infringements package, formal notice to 17 Member States to fully transpose into national laws the EU NIS […]

Read more

Newsletter 9 – July 12, 2018

Some interesting stuff:   SECURITY: Apparently, the future of encryption are Quantum Random Number Generators. They generate random numbers by measuring the unpredictable attributes of subatomic particles. And now we have one that is also fast and efficient: https://phys.org/news/2018-07-game-revolutionise-cybersecurity.html https://spectrum.ieee.org/telecom/security/the-future-of-cybersecurity-is-the-quantum-random-number-generator UK Drone plans on Dark Web –  https://www.theregister.co.uk/2018/07/11/us_military_manual_dark_net_sale/ Forrester Endpoint Security Report Q2 2018: https://www.forrester.com/report/The+Forrester+Wave+Endpoint+Security+Suites+Q2+2018/-/E-RES137973 […]

Read more

Newsletter 8 – July 5, 2018

Some interesting stuff: SECURITY: Thanatos Ransomware Decryptor Released by the Cisco Talos Group – https://www.bleepingcomputer.com/news/security/thanatos-ransomware-decryptor-released-by-the-cisco-talos-group/ Splunk Top 20 Critical Security Controls – https://www.splunk.com/en_us/form/top-20-csc-report.html NIST workshop on IoT cyber-security – https://www.nist.gov/news-events/events/2018/07/considerations-managing-iot-cybersecurity-and-privacy-risks-workshop U.S. House Passes Bill to Enhance Industrial Cybersecurity – https://www.icscybersecurityconference.com/u-s-house-passes-bill-to-enhance-industrial-cybersecurity/ American version of GDPR – https://www.theverge.com/2018/6/28/17509720/california-consumer-privacy-act-legislation-law-vote NSA’s hidden spy hubs – https://theintercept.com/2018/06/25/att-internet-nsa-spy-hubs/ UK minimum cyber […]

Read more

Newsletter 7 – June 28, 2018

Some interesting stuff:   SECURITY: WPA3, the new Wi-Fi standard is out – https://www.securityweek.com/wi-fi-alliance-launches-wpa3-security-standard – https://nakedsecurity-sophos-com.cdn.ampproject.org/c/s/nakedsecurity.sophos.com/2018/06/27/wpa3-is-here-but-how-will-it-make-wi-fi-more-secure/amp/ – https://www.darkreading.com/operations/wpa3-brings-new-authentication-and-encryption-to-wi-fi/d/d-id/1332145 The “famous” Verizon Data Breach Investigation Report 2018 – https://www.verizonenterprise.com/resources/reports/rp_DBIR_2018_Report_execsummary_en_xg.pdf Ukraine fears a new coordinated attack from Russia – https://www.cnet.com/news/ukraine-fears-a-coordinated-hacking-attack-from-russia-notpetya/ Russia again – https://www.thecipherbrief.com/column/cyber-advisor/dont-underestimate-economic-side-russias-cyber-warfare Six EU states sign declaration on cyber rapid response – https://thedefensepost.com/2018/06/25/lithuania-cyber-rapid-response-pesco/ – https://www-theregister-co-uk.cdn.ampproject.org/c/s/www.theregister.co.uk/AMP/2018/06/27/eu_cyber_force/ […]

Read more

Newsletter 6 – June 14, 2018

Some interesting stuff:   SECURITY: An easy guide on blocking malware – https://www.barkly.com/the-essential-guide-to-blocking-malware-without-a-soc List of most dangerous new top level domains – https://krebsonsecurity.com/2018/06/bad-men-at-work-please-dont-click/ NTT Security 2018 Global Threat Intelligence Report – https://insight.nttsecurity.com/post/102eusx/the-2018-global-threat-intelligence-report-is-out-now Comprehensive study on how HABITUATION (decreased response to repeated stimulation) is a serious threat to the effectiveness of security warnings – https://neurosecurity.byu.edu/misq-longitudinal-2018/ https://www.schneier.com/blog/archives/2018/06/the_habituation.html […]

Read more

EU’s cyber-security regulatory boost and how it will influence the security market

Cyber security regulatory landscape in Europe is having a major face-lift. You might have noticed the excessive noise on traditional media channels and social media platforms around the new EU data protection regulation (General Data Protection Regulation – GDPR), enforced on the 25th of May. You might have also also noticed that everybody is talking […]

Read more
cooperation in cyber security

About cooperation in cyber-security

Cooperation is “the process of groups of organisms working or acting together for common or mutual benefit, as opposed to working in competition for selfish benefit” (Wikipedia). Thus, mutual benefit seems to be the key ingredient here. Nevertheless, identifying the mutual benefit appears to be an issue in cyber-security (and other fields, for that matter) […]

Read more