Using Similar Taxonomies To Understand Present And Future Security Challenges

via Terena.org

In what is certainly the single most fascinating and well-crafted piece on the taxonomy of organized crime in months; and it’s present and future significance for information and cyber security professionals (and non-professionals as w… Continue reading Using Similar Taxonomies To Understand Present And Future Security Challenges

The Unintended Harms of Cybersecurity

Interesting research: "Identifying Unintended Harms of Cybersecurity Countermeasures": Abstract: Well-meaning cybersecurity risk owners will deploy countermeasures (technologies or procedures) to manage risks to their services or systems. In so… Continue reading The Unintended Harms of Cybersecurity

Encryption: Politicians Try to Outlaw Math (Again)

As we all know by now, it’s impossible to meet the irreconcilable aims of data security and government backdoors.
The post Encryption: Politicians Try to Outlaw Math (Again) appeared first on Security Boulevard.
Continue reading Encryption: Politicians Try to Outlaw Math (Again)

Best of 2020: BlueLeaks is Huge FAIL for Anonymous and DDoSecrets

Anonymous and Distributed Denial of Secrets have published 269 GB of private law-enforcement data. What were they thinking?
The post Best of 2020: BlueLeaks is Huge FAIL for Anonymous and DDoSecrets appeared first on Security Boulevard.
Continue reading Best of 2020: BlueLeaks is Huge FAIL for Anonymous and DDoSecrets

European and North American Countries are Least Exposed to Cyberattacks, New Study Reveals

A new report from PasswordManagers.co highlights the exposure of countries worldwide to the growing wave of cyberattacks. In its Cybersecurity Exposure Index (CEI) 2020, the company analyzed and rated 108 countries based on exposure to malicious attack… Continue reading European and North American Countries are Least Exposed to Cyberattacks, New Study Reveals

Recent Cases Question Backdoor Encryption

Recent events are calling into question the necessity of computer backdoors and the future of our personal privacy U.S. law enforcement for decades has decried the “going dark” problem with computers and computer technologies. If anyone can secure the… Continue reading Recent Cases Question Backdoor Encryption

Section 230 Update: DOJ, Sen. Hawley Propose Limiting Online Platforms’ Protections

On June 17, 2020, in a 28-page report released on the topic of online platform liability, the U.S. Department of Justice proposed four material modifications of Section 230 of the CDA:  Narrowing Section 230’s applicability where the platfo… Continue reading Section 230 Update: DOJ, Sen. Hawley Propose Limiting Online Platforms’ Protections

Twitter Nukes 32,000 More State Trolls, Mostly From China

Chinese government trolls have been feeding racial unrest and lying about Hong Kong, according to Twitter.
The post Twitter Nukes 32,000 More State Trolls, Mostly From China appeared first on Security Boulevard.
Continue reading Twitter Nukes 32,000 More State Trolls, Mostly From China

Privacy and Morality: Data’s Double-Edged Sword

When security professionals think of “good” data and “bad” data, we think of things including accuracy, reliability, recency and applicability. But a more significant question is about data collection and use. All too often we focus our attention on d… Continue reading Privacy and Morality: Data’s Double-Edged Sword

5 Tips to Stay Private and Secure During a Protest

In episode 125 for June 15th 2020: Our top 5 tips for staying private and secure during a protest. ** Show notes and links mentioned on the show ** Privacy And Security While Protesting https://silent-pocket.com/blogs/news/privacy-and-security-while-pr… Continue reading 5 Tips to Stay Private and Secure During a Protest