The title to this article IMHO, aims to make the reader CHOOSE SIDES as to what is more important, Privacy or National Security. I propose to you that the expectation of Privacy, which is clearly defined in the 4th Amendment, and the DEFENSE of that Right, is what makes the United States unique as a…
Category: Computer Related
An Easy Way for Hackers to Burn Industrial Motors
HACKS THAT CAUSE physical destruction are so rare they can be counted on one hand. The infamous Stuxnet worm was the first, causing physical destruction of nuclear centrifuges in Iran in 2009. In 2014, Germany reported the second known case of physical destruction involving a furnace at a steel mill. Both of these attacks required…
Calculating your “Threat Score”
As technology advances in our society, those sci-fi movies that everybody thought were outlandish and far-fetched will start being seen as harbingers. After reading this article, watch a few minutes of the movie “Minority Report”. “Psychic Technology” is nothing more now than an advanced algorithm. -SF FRESNO, Calif. — While officers raced to a recent…
Surveillance is the Business Model of the Internet
The Internet of Things That Talk About You Behind Your Back SilverPush is an Indian startup that’s trying to figure out all the different computing devices you own. It embeds inaudible sounds into the webpages you read and the television commercials you watch. Software secretly embedded in your computers, tablets, and smartphones pick up the…
The Russians Just Did a Cyber-Attack Practice Run on Ukraine’s Nationwide Power Grid…America is Next
The Russians are masters of 4th Generation Warfare. They know the United States must be attacked on several fronts to weaken it internally before a Conventional strike happens. Look for continued attacks on the Financial sector as well. A Nationwide Cyber-Attack on a Power Grid is now a stark reality folks. IMO it is not…
U.S. Voter Database Mysteriously Appears Online in the Open
A misconfigured database has provided users of the World Wide Web access to 191 million voter records. White hat hacker Chris Vickery happened upon the leaky system and sent CSO’s Steve Ragan his personal voter record to prove it. “It was current based on the elections listed. My personal information was accurate too,” Ragan writes….
Cyber-Espionage: The Biggest Dangers are the Ones You Will Never Know About
For years, I slept fitfully after a “friend” told me that it wasn’t the noisy mosquitos buzzing in my ears at night that were a problem. Instead, it was the female mosquitos that made no noise at all but laid eggs in your ears at night. That image wrecked my sleep until the Internet helped…
3-D Printing Will Disrupt the World in Ways We Can Barely Imagine
In the last few years, additive manufacturing, also known as 3-D printing, has transformed from an interesting hobby to an industry producing a wide range of products. It is on the path to causing major disruptions in global trade — and changing the international security environment. The explosion of additive manufacturing means it is virtually…
This article Will NOT Boost Your Confidence in American Cyber-Defense Capabilities
Iranian hackers infiltrated the control system of a small dam less than 20 miles from New York City two years ago, sparking concerns that reached to the White House, according to former and current U.S. officials and experts familiar with the previously undisclosed incident. The breach came amid attacks by hackers linked to Iran’s government…
Merry Christmas America! Congress secretly Slips CISA into Budget Bill
Update 12/18/2015 12pm: The House and Senate have now passed the omnibus bill, including the new version of CISA. Privacy advocates were aghast in October when the Senate passed the Cybersecurity Information Sharing Act by a vote of 74 to 21, leaving intact portions of the law they say make it more amenable…