Bret Witt

45 Added | 1 Magazine | 4 Likes | 1 Follower | @BretWitt | Keep up with Bret Witt on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Bret Witt”

How Eric Schmidt, Cisco, And An Israeli Spymaster Launched A New Cybersecurity Incubator

Nadav Zafrir, the former Unit 8200 chief, has brought many entities together. One partner calls it a “kooky structure” for a company.<p>A new cybersecurity incubator named Team8 Ventures that is exiting stealth mode today has an unusual pedigree: Co-founded by the recently departed chief of Israel’s …

Cybersecurity

Forbes.com Hacked In November, Possibly By Chinese Cyber Spies

Back in late November, Forbes.com was hacked. If cyber security firms are right, Chinese hackers are to blame, but there’s not enough evidence to guarantee attribution just yet.<p>The hackers tinkered with the Adobe Flash widget that delivers the Thought of the Day page that visitors to Forbes.com are …

Cybersecurity

Will increasing cyber attacks spell the end of username and password security?

US regulators are considering mandating that companies ramp up online protections, but analysts warn there is no immediate cure-all<p>When a burglar breaks into a home, changing the locks or otherwise shoring up the home’s security is among the first things likely to get done in the …

Cybersecurity

How the 'Internet with Chinese Characteristics' Is Rupturing the Web

China is openly undermining the United States' vision of a free and open Internet. Motivated by maintaining the fragile balance between information control, social and political stability, and continued modernization and economic growth for an online population of over 600 million, the Chinese …

China

Regin, new computer spyware, discovered by Symantec

http://vod-pro-ww-live.akamaized.net/mps_h264_hi/public/news/world/1126000/1126409_h264_1500k.mp4?__gda__=1522514508_8312bba598b973ff8cffaab2511a7fb1<p><b>A leading computer security company says it has discovered one of the most sophisticated pieces of malicious software ever seen.</b><p>Symantec says the bug, …

Saudi Arabia

Highly-complex malware has secretly spied on computers for years, say researchers

Trojan is likely state sponsored, has attacked Russian, Saudi internet providers and telecoms since 2008<p>Security researchers have discovered one of the most advanced pieces of malware ever created — and it's been in use since at least 2008. Symantec researchers published their findings today on a …

Privacy push means free encryption for websites

Secure network connections protect people against snooping and criminals, but it's a hassle for websites. Mozilla, Cisco, the Electronic Frontier Foundation and others want to change that.<p>A tech-industry alliance announced a move Tuesday to help make privacy on the Web the rule rather than the …

Privacy

US tech firms help terrorists, says new UK spy chief. Maybe, but they also help the rest of us.

Advertisement<p>5 Comments<p>The new head of British spy agency GCHQ has attacked Silicon Valley tech firms for aiding terrorism by providing greater …

Security contractor breach not detected for months

WASHINGTON (AP) — A cyberattack similar to previous hacker intrusions from China penetrated computer networks for months at USIS, the government's leading security clearance contractor, before the company noticed, officials and others familiar with an FBI investigation and related official …

It looks like Russia and smells like Russia ... but is it Russia?

It's easy to say Russians are hacking the White House and major U.S. companies. It's harder to prove it.<p>When cybersecurity firms and U.S. government officials attribute attacks to the Russian government -- or independent hackers operating with Kremlin approval -- the typical evidence they use is …

Where to find security certifications

Security certifications<p>The debate rages on whether gaining security certifications means much. Regardless of whether you think they aren't even worth …

Carnegie Mellon University

Exposing the hidden history of computer hacking

<b>In 1998, Chris Wysopal and friends discovered a way to shut down the internet.</b><p>With just 30 minutes of work they believed they could do enough damage to stop the world wide network operating for a couple of days.<p>They told people about what they found but not in a chat channel or discussion forum. …

Mark Zuckerberg

Now the FBI is asking Congress to weaken iPhone and Android security

But the bureau's chances of success are slim<p>FBI Director James Comey has been on a media tour lately, making an anti-encryption pitch to the public. Apple's new encryption standards, Comey has argued, are an unnecessary hurdle to law enforcement — and the FBI needs an easy way to bypass them. Now …

The NSA can now use Samsung's Galaxy phones for classified work

Samsung Galaxy phones and tablets have just become the first consumer mobile devices approved by the US National Security Agency (NSA) to carry classified documents. The edict covers most of its newer Galaxy devices, including the Galaxy S5, Galaxy Note 4, and the Galaxy Note 10.1 tablet (2014 …

Take A Rare Peek Inside The Massive Data Centers That Power Google

But not Google. The search giant has shared with the world photos that lift the veil off its massive and beautiful data centers around the world, in places both domestic, including Iowa, Oregon, Georgia, South Carolina, and Oklahoma, and abroad, in Finland and Belgium.<p>Google says when you're on its …

South Carolina

Ebola advice emails from 'World Health Organization' are malware spam

Security firm warning over DarkComet Remote Access Trojan, although campaign is not ‘widespread’ yet<p>If you’ve got an email in your inbox from the World Health Organization offering “information and prevention” tips about Ebola, don’t click on its attachment – you’re likely to end up with a nasty …

China linked to cyber attacks on Taiwan exploiting Windows vulnerability

Malicious PowerPoint documents launch exploit code on target PCs when opened, but could have used any Microsoft Office file<p>Microsoft has warned about a new, unpatched software vulnerability affecting almost all Windows machines, which is remarkably similar to a flaw used in recent cyberattacks on …

China Is The World's Top Source Of Internet Attack Traffic [Infographic]

China is the place where the vast majority of Internet attack traffic originates from, according to Akamai’s most recent “State of The Internet” report. Denial-of-service or DDoS attacks overwhelm computers and networks with high levels of online activity, usually through a network taken over or …

Companies and organizations react to Shellshock flaw with patches and advice

Advertisement<p>2 Comments<p>Credit: Gigaom Illustration<p>Linux vendors and big web service providers are racing to mitigate the impact of the Shellshock …

Kevin Mitnick, Once the World’s Most Wanted Hacker, Is Now Selling Zero-Day Exploits

As a young man, Kevin Mitnick became the world's most notorious black hat hacker, breaking into the networks of companies like IBM, Nokia, Motorola, …

Russian malware used by 'privateer' hackers against Ukrainian government

A hacker tool popular across underground Russian crime networks has been used in attacks on the Ukrainian government, indicating the use of “privateers” for digital espionage, according to researchers.<p>The malware, known as BlackEnergy, appears to have been used in cyberattacks against Georgia …

North Korea Cracks Down on WiFi Networks at Embassies

The North Korean regime is cracking down on international embassies and their use of WiFi networks, after reports suggested locals were connecting to the internet via them.<p>The excellent North Korea Tech blog reports that embassies had been ordered to encrypt and password lock their networks, or …

The Feds Explain How They Seized The Silk Road Servers

Last month, Ross Ulbricht—the alleged Silk Road mastermind who is facing trial in November for multiple drug and ID fraud charges—filed a motion arguing that his Fourth Amendment rights had been violated in the government’s seizure of the Silk Road servers and subsequent searches. In response, the …

The Unlikely Alliance of Hackers Fighting the Islamic State

A motley crew of unlikely allies are taking on the Islamic State online, taunting them, taking down Twitter accounts and allegedly jamming the …

Hackers Have Gained Control Of Satoshi Nakamoto's Email Account And Are Threatening To Reveal His Identity

"Satoshi Nakomoto" is the name used by the anonymous developer who created Bitcoin and published details of it online in 2008. It's unknown whether Nakamoto is a private individual, a group of hackers, or whether the creator's name really is Satoshi Nakamoto.<p>In an email to Wired, the hacker said: …

Bitcoin

NATO takes aim at Russia's attacks — online

Ukraine isn't the only place where Russia and the West are facing off. Cyberspace is also a battleground. And at this week’s summit in Wales, NATO leaders seem ready to pledge to a joint defense against cyberattacks — partly in response to Russia’s suspected involvement in cyberwarfare.<p>“Because …

21 Simple and Free SEO Tools to Improve Your Marketing

<i>This post originally appeared on the Buffer blog.</i><p>Whenever I dream up a home improvement project for my place, I end up working smartest and fastest when I have the right tools at my disposal. It’s amazing the difference a good tool can make – and the extra time it takes to get work done without a …

Online Protest In Support of Net Neutrality Planned For Sept. 10

Web activists are planning an online protest for next week to press federal regulators for stronger rules to protect net neutrality, or the idea that all web content should be treated equally.<p>The activists are asking websites and social networks to join the protest on Sept. 10 by embedding special …

Who is putting up 'interceptor' cell towers? The mystery deepens

Mysterious “interceptor” cell towers in the USA are grabbing phone calls — but they’re not part of the phone networks. And, two experts told VentureBeat today, the towers don’t appear to be projects of the National Security Agency (NSA).<p>The towers were revealed by Les Goldsmith to Popular Science …