Cyber Security Intelligence

Twitter< Follow on Twitter>


Newsletter September #1 2015

This Newsletter reaches over 5,000  IT and Cyber Security professionals weekly: Contact us here for information on partnership & sponsorship opportunities. 

Biometric Security: From A Selfie To the Way You Walk

The mobile, cloud, banking & payments industries must prepare for the shift from traditional authentication to new biometric systems.  read more

 

Psychologists Work for GCHQ Deception Unit

Should psychologists should offer their expertise to spy agencies engaged in deception & propaganda?  read more

 

A Cyber Attack on US Power Grid Will Cost $1 Trillion

Thirty two percent of U.S emergency responses  to cyber security threats occurred in the energy sector.  read more

 

US Insurance Underwriters Launch Cyber Security Program

Insurance Industry supports proposals for a reputable certification program for IoT products.  read more

 

China Calls US a 'Cyber Bully' After False Accusation

Think Twice: Retaliation against China for the giant OPM Hack could be a big mistake.  read more

 

Hackers to Military: Replace Us With Robots –Don't Think So!

Next year's DARPA Cyber Grand Challenge event will pit humans against machines in a grand hacking war.  read more

 

Darkhotel Deploys Zero-Day From Hacking Team

Darkhotel: Latest research shows how the spy gang continues to evolve its cyber espionage methods.  read more

 

A Drone That Hacks Computers

Aerial Assault: A quadcopter that scans the world below for insecure devices and vulnerable WiFi ports.  read more

 

Seamless Technology Is a Gift for Cybercriminals

With cybercrime estimated to costs businesses more than $2tn by 2019, Marc Goodman says design is the best defence.  read more

 

Hacking For Cause: A Growing Cyber Security Trend

What is the hacker motive if not financial  gain and is there is an evolving definition of right and wrong regarding hacking?  read more

 

Hackers Can Remotely Shoot Someone Else's Sniper Rifle

American Sniper? A cyber hack that can  disable the weapon from a distance, or at least manipulate it into not working properly.  read more

 

Countdown: 10 Things Cyber Crooks Can Do To Your Computer - Without Touching It

Your computer may not have symptoms, but it  may still be infected.  read more

 

Hack on United Airlines Makes CIA's Job More Difficult

Stolen medical & financial records may now include US intelligence officials' travel itineraries from the world's second-largest airline.  read more

Black Hat Budgeting: What Would You Do With $1million?

A thought Experiment by Richard Bejtlich of Tao Security.  read more


New monthly Directors Report coming soon: Contact us here for details

SUBSCRIBE TO THIS NEWSLETTER