Tech Grid


Loading...

Russian Billionaire Wants to Create Cyborgs for Real

“As Digital Trends describes, the ultimate goal is to be able to transfer a person’s mind or consciousness from a living brain into a machine with that person’s personality and memories intact. Freed of physical form, the person would exist in a network similar to the Internet and be able to travel at the speed […]

I’m excited! “@bobgourley: Congrats to my friend @MattDevost for selction to #glassexplorers program. Woohoo!” View // Reply // Retweet // Favorite

“Funded hacktivism” or cyber-terrorists, AmEx attackers have big bankroll

“On March 28, American Express’ website went offline for at least two hours during a distributed denial of service attack. A group calling itself ‘the cyber-fighters of Izz ad-Din al-Qassam’ claimed responsibility for the attack, which began at about 3:00pm Eastern Time. In a statement, an American Express spokesperson said, ‘Our site experienced a distributed-denial-of-service […]

Damn, congrats. I’m jealous - @corbett3000 You’re invited to join our #glassexplorers program. View // Reply // Retweet // Favorite

Pakistan Intelligence agency hacked by Indian hacker

“While the rest of the world engaged in cyber security conferences and Anonymous operations, an Indian patriotic hacker used the time to attack Pakistan Intelligence agency ISI. Hacker going by name ‘Godzilla’ today claimed to hack into one of the server belongs to ISI website (http://isi.org.pk) and gets all possible secret information about Pakistan Intelligence. […]

Read this morning that price of Bitcoin at $50.00/coin means a $500 investment last year now $10k. Current price is $90/coin. Not stable. View // Reply // Retweet // Favorite

Pentagon cyberdefenses weak, report warns

“A new report for the Pentagon concludes that the nation’s military is unprepared for a full-scale cyber-conflict with a top-tier adversary and must ramp up its offensive prowess.” Source: Pentagon cyberdefenses weak, report warns – The Washington Post Via OODA Loop

Interesting @projectglass accepted (then refused) joke Google Glass submissions. What about those that wanted to be actual explorers? View // Reply // Retweet // Favorite

Cassidian CyberSecurity and Netasq launch new approach

“Cassidian CyberSecurity and Netasq used their press briefing at the Cyber Defence Summit in Oman to highlight the real dangers posed to organizations and infrastructure in the Middle East region by APTs (Advanced Persistent Threats) and outline a 7 Step Approach, combining expertise, processes and new tools to combat these threats.” Source: Cassidian CyberSecurity and […]

Your FitBit creates a unique identifying signature - Surprised this quote by CIA CTO hasn’t gotten more attention. http://t.co/2kvXyy6vbB View // Reply // Retweet // Favorite

New UK.gov cyber-security standard puts MANAGERS in firing line

“The UK government is seeking to hear from businesses that would be interested in submitting evidence to help form a new ‘organisational standard’ for cyber security.” Source: New UK.gov cyber-security standard puts MANAGERS in firing line • The Register Via OODA Loop

Not sad to see them get hit given my history with them - “@ooda: OODA Loop: Spamhaus Cyberbunker DDOS Attack | http://t.co/dy4RiYg56L View // Reply // Retweet // Favorite

SaaS integration challenges pose security risks

“Faced with difficulties integrating disparate software, companies end up bypassing security protocols and with data residing across various systems and locations. “ Source: SaaS integration challenges pose security risks | ZDNet Via OODA Loop

I’m hopeful the content of this CTO Vision podcast is interesting enough for you to spend 18 minutes listening. http://t.co/7JczI2EIdE View // Reply // Retweet // Favorite

Hackers Pull Off $12,000 Bitcoin Heist

“A Bitcoin transaction services company says that hackers broke into one of its brokerage accounts last week, nabbing more than $12,000 worth of the digital currency. That attack knocked Bitinstant offline over the weekend. The company says that while it lost Bitcoins, no customers were affected by the hack.” Source: Hackers Pull Off $12,000 Bitcoin […]

I can’t get to my bank. Another DDOS attack must be underway. View // Reply // Retweet // Favorite

Kenya election: Computer bug blamed for vote error

“Kenya’s electoral commission has said that a computer bug is to blame for a large number of rejected votes in the tallying of the presidential election.” Source: BBC News – Kenya election: Computer bug blamed for vote error Via OODA Loop

BTW, that picture is over 10 years old at this point. Developed by my colleague and friend, the late Robert Garigue http://t.co/l5rqtpNXVF View // Reply // Retweet // Favorite

How China censors 100 million tweets per day

“A new study by researchers at Rice, Bowdoin and the University of New Mexico sheds unprecedented light on how China censors the 300 million users and 100 million daily messages of its Twitter-like platform, Weibo.” Source: How China censors 100 million tweets per day Via OODA Loop

For those listening on @ctovision podcast. Here is the slide I referenced. http://t.co/5NrQt3iW0I View // Reply // Retweet // Favorite

Senate hearing shows discord over cybersecurity bill

“As the White House and congressional lawmakers resume talks on legislation to improve U.S. defenses against cyber-attacks, Homeland Security Secretary Janet Napolitano on Thursday signaled that disagreements remain over a House cybersecurity bill, which she called insufficient.” Source: Senate hearing shows discord over cybersecurity bill – Technology on NBCNews.com Via OODA Loop

Friday humor http://t.co/EboCH2fAB1 View // Reply // Retweet // Favorite

How did Evernote handle its hacking crisis?

“Over the coming weeks we will try to reverse engineer the reasoning behind of some of these crisis management decisions, and with your help look at whether the approach stands up to scrutiny, and what can learn from it. “ Source: How did Evernote handle its hacking crisis? | The Drum Via OODA Loop

Spot freaking on by Om. why should we trust Google with Keep after Reader. http://t.co/OqWfXkQHWh View // Reply // Retweet // Favorite

Inside the Black Box

“Very little that China does escapes the notice of the NSA, and virtually every technique it uses has been tracked and reverse-engineered. For years, and in secret, the NSA has also used the cover of some American companies — with their permission — to poke and prod at the hackers, leading them to respond in […]

Thanks for the mention - @mikeolson: I am big data and so are you. /@mattdevost http://t.co/NNnkHluH6N View // Reply // Retweet // Favorite

Obama’s Cyberwarfare Strategy Will Backfire

“Cyberspace, American leaders have not fully realized, is not like other national security issues. America’s true cyber power is not the National Security Agency or Cyber Command, but our technology companies that create and maintain cyberspace and the factories, banks, small businesses, artists, and citizens that use it to enrich our commerce and culture and […]

I am Big Data and so are you. http://t.co/TCGQKnq984 View // Reply // Retweet // Favorite

EPA completes Cloud Email Migration, Cuts Hit Cyber Drills and Security Programs and more

“Here are the top cyber news and stories of the day.” Source: EPA completes Cloud Email Migration, Cuts Hit Cyber Drills and Security Programs and more Via OODA Loop

Cybersecurity challenges in 2013

“The security issues affecting businesses are similar around the world. Most involve employees innocently bringing an infected personal mobile device into the corporate network, or clicking on a social media link that looks harmless but hides a Trojan or worm that will secretly steal data and money and, potentially, remain undetected with severe impact on […]

China foreign minister rejects hacking accusations

“China’s foreign minister on Saturday rejected accusations that the country’s military was behind massive hacking attacks on U.S. and other foreign targets and called for more international cooperation in policing the Internet.” Source: China foreign minister rejects hacking accusations Via OODA Loop

DHS Worries More About a ‘Fundamental Attack’ in Cyberspace than Theft, Napolitano says

“The Homeland Security Department is more devoted to preempting a future cyberattack that could upend the economy or kill civilians than countering ongoing cyber fraud, DHS Secretary Janet Napolitano said of her agency’s multifaceted network protection agenda.  ‘From a standpoint of where we focus most of our efforts — we do the theft of intellectual […]

China says U.S. is top source of hacking attacks on country

“The United States was the origin of more than half of the hacking attacks on China in the first two months of 2013, state news agency Xinhua said on Sunday, amid escalating tensions between Beijing and Washington over the use of the Internet.” Source: China says U.S. is top source of hacking attacks on country […]

China Calls For End To ‘Cyber War’

“A top official in the Chinese government said Saturday that nation’s should devise a unified set of rules on cyber attacks instead of fanning the flames of cyber warfare. China has been blamed for attacks on U.S. media outlets like The New York Times and Wall Street Journal as well as a host of other attacks […]

Electronic al-Qaeda Army claims to have hacked US government websites

“Cyberwarriors in Tunisia and China have reportedly joined forces with al-Qaeda hackers in order to attack United States government websites. Hackers pledging allegiance to the Tunisian Cyber Army claim to have compromised the security of US State Department and Department of Defense websites as part of an anti-America campaign called Operation Black Summer, or #OpBlackSummer. […]

Many Watering Holes, Targets In Hacks That Netted Facebook, Twitter and Apple

“The assailants responsible for the cyber attacks used at least two mobile application development sites as watering holes in addition to the one web site that has been disclosed: iPhoneDevSDK.com. Still other watering hole web sites used in the attack weren’t specific to mobile application developers – or even to software development. Still, they served […]

US national security advisor warns China: ‘We will take action… against cyber threats’

“The White House is talking tougher in its growing public conflict with China over cyber attacks on American businesses, which have reportedly been linked back to hackers operating within China’s boundaries. On Monday, Tom Donilon, the US national security advisor to President Obama, gave a lengthy address to the Asia Society in New York City, […]

China says willing to discuss cyber security with the U.S.

“China offered on Tuesday to talk with the United States about cyber security amid an escalating war of words between the two sides on computer hacking, but suspicion is as deep in Beijing as it is in Washington about the accusations and counter-accusations.” Source: China says willing to discuss cyber security with the U.S. | […]

Pentagon creating teams to launch cyberattacks as threat grows

“The Pentagon’s Cyber Command will create 13 offensive teams by the fall of 2015 to help defend the nation against major computer attacks from abroad, Gen. Keith Alexander testified to Congress on Tuesday, a rare acknowledgment of the military’s ability to use cyberweapons. The new teams are part of a broader government effort to shield […]