Fing is a nice app that runs on your smartphone or tablet that will show you who else is on your network. It puts a nice interface on capabilities like Ping, Traceroute and many others and presents information in a way that is fast. You can find links to download the app at Fing.io, and […]
Cyber Threats
Re-Engineering Humanity: How Technology Threatens The Future Of Society
Re-Engineering Humanity: How Technology Threatens The Future Of Society by Brett Frischmann and Evan Selinger, provides focused thought into the creeping dangers of the ubiquitous technology we have surrounded ourselves with, focusing on the social technologies that pose the greatest threats to our thinking. Now more than ever we need a dose of quality tech […]
FBI Warns About Targeting Of Internet of Things Devices
The FBI, via the Internet Crime Complaint Center at www.ic3.gov has information they want you to know about. The government is worried about the threats that bad guys are posing to all of us who use tech, especially Internet of Things (IoT) devices. The bad guys compromised IoT device for many reasons, including for use as ways […]
In The Age Of Fake News It Is More Important Than Ever To Know Your Cognitive Biases
Learning the way you think, including information on common cognitive biases, can help your brain to make better, more rapid assessments on new data. This is critically important in the age of overwhelming information we are currently living in. The average citizen is surrounded with information from TV, radio, entertainment, the Internet, social media, co-workers, […]
The Economist Predicts Hackers Will Pose A Greater Threat
This is a very good overview of the state of attack and defense in the modern world where every cyber thing is connected. This report is short/succinct and easy to watch but makes several very important points that capture how hackers may be impacting our lives, homes and work in the coming year. You might […]
Learn Most Important Lessons Of Cyber Conflict with A Fierce Domain: Conflict in Cyberspace
Cyber conflict is hard to conceptualize because cyberspace itself is hard to understand. The best definition is the one that popularized the term. William Gibson of Nueromancer fame, wrote that Cyberspace is: A consensual hallucination experienced daily by billions … Unthinkable complexity. Gibson really nailed it. Cyberspace today is all our interconnected IT. And it is absolutely […]
How Hackers Really Crack Your Passwords
Have you ever wondered how hackers really get passwords? If your only source of information is the movies you might have the wrong idea (Ha, see Hacking In The Movies vs Hacking in Real Life). This video provides a clear explanation of how hackers steal and/or crack passwords. The techniques are actually not that complex […]
AI Update: Microsoft Research on Artificial Intelligence and Cyber Security
AI is becoming widespread, especially in the cybersecurity community. This means in the very near future, every company, and every person, will be using AI. We will all need a more secure framework to deal with AI topics and address AI concerns. There are huge security concerns we will all have to address, some of […]
Back to the future – Moonlight Maze
Thomas Rid dives deep into the first major APT (advanced persistent threat), the operation known as Moonlight Maze. This presentation comes from the detailed account of this event in his book, The Rise of the Machines, which was published in the summer of 2016. From the book write-up: As lives offline and online merge even […]
A Hacker Shows Us How Easy It Is To Gain Unauthorized Access
Hacker Pablos Holman does a quick overview of some hacking capabilities, bringing it home for the audience by showing them how he can access information relevant to their daily lives. He also demonstrated in very humorous ways that he can exploit hotel systems by hacking, including hotel TV services. He even demonstrated how he could […]