Kok Koon

4,753 Flips | 3 Magazines | 470 Likes | 48 Following | 192 Followers | @KokKoon2015 | Keep up with Kok Koon on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Kok Koon”

Military Reaper Drone Documents Leaked on the Dark Web

By Andrei Barysevich on July 10, 2018<p><i>Scope Note: Initial analysis into the leak of sensitive military information regarding the MQ-9 Reaper unmanned</i> …

Cisco Removes Backdoor Account, Fourth in the Last Four Months

For the fourth time in as many months, Cisco has removed hardcoded credentials that were left inside one of its products, which an attacker could …

Hacker Who Worked With FSB Agents in Email Hacks Gets 5 Years in Prison

A 23-year-old Canadian man who hacked into Yahoo and Gmail accounts on behalf of Russian Secret Service (FSB) agents was sentenced to five years in …

How spies can use your cellphone to find you – and eavesdrop on your calls and texts too

Surveillance systems that track the locations of cellphone users and spy on their calls, texts and data streams are being turned against Americans as they roam the country and the world, say security experts and U.S. officials.<p>Federal officials acknowledged the privacy risk to Americans in a …

Surveillance

5 ways deception tech is disrupting cybersecurity

Enterprises and their Security Operations Centers (SOCs) are under siege. Security events are being triggered from all corners of the security stack – from the firewall, endpoints, and servers, from intrusion detection systems and other security solutions.<p>What’s more is that security teams do not …

FBI Takes Control of APT28's VPNFilter Botnet

The US Federal Bureau of Investigation (FBI) has obtained court orders and has taken control of the command and control servers of a massive botnet …

You know that silly fear about Alexa recording everything and leaking it online? It just happened

<b>Updated</b> US pair's private chat sent to coworker by AI bugIt's time to break out your "Alexa, I Told You So" banners – because a Portland, Oregon, …

Military brainboxes ponder 'UK needs you' list of AI boffins

<b>Rise of the Machines</b> We're falling behind, shout Shrivenham sortsThe Ministry of Defence wants to compile a list of AI boffins with UK security …

Active Defense and “Hacking Back”: A Primer

In the lead piece in this package, Idaho National Lab’s Andy Bochman puts forth a provocative idea: that no amount of spending on technology defenses can secure your critical systems or help you keep pace with hackers. To protect your most valuable information, he argues, you need to move beyond …

How to measure risk with a better OKR.

I’ve become a big fan of the <i>Objective and Key Result</i> (OKR) at companies that take them seriously. I’ll describe an opinionated method that fits …

​How Australia's Department of Defence is using IBM Watson

The Department of Defence told ZDNet it has highlighted at least 14 use cases for its on-premises version of IBM Watson to use artificial …

Twitter Is Going To Limit The Visibility Of Tweets From People Behaving Badly

Act like a jerk, and Twitter will start limiting how often your tweets show up.

This Is How Threat Actors Overwhelm the Defenses of Ad Networks

<b>Also by Ian Cowger</b><p>Traffic is a vital commodity in the cybercrime ecosystem that enables criminals to monetize their campaigns in various ways, …

Study: Attack on KrebsOnSecurity Cost IoT Device Owners $323K

A monster distributed denial-of-service attack (DDoS) against KrebsOnSecurity.com in 2016 knocked this site offline for nearly four days. The attack …

UC Berkeley

Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers

<i>Note:</i> Indicators can be found in the PDF version of this report and our GitHub Detection IOC repository.<p>Key Judgements<p>We assess with high confidence …

A Criminal Gang Used a Drone Swarm To Obstruct an FBI Hostage Raid

And that’s just one of the ways bad guys are putting drones to use, law enforcement officials say.<p>DENVER, Colorado — Last winter, on the outskirts of …

Five Strategies for Security and Operations Success

The Department of Defense (DOD) has long been at the tip of the spear when it comes to successfully melding IT security and operations (SecOps). Over …

IDG Contributor Network: DOD releases new guidance giving teeth to cybersecurity rules to protect data within the supply chain

The US Department of Defense issued new guidance on how it might penalize business partners that do not adequately adhere to new security rules …

NATO wins world’s biggest ‘live-fire’ cyber exercise

Blue teams from around the world gathered in Estonia for Locked Shields 2018.

SiliVaccine: Inside North Korea’s Anti-Virus

By: Mark Lechtik and Michael Kajiloti Revealed: In an exclusive piece of research, Check Point Researchers have carried out a revealing investigation …

WhatsApp founder plans to leave after broad clashes with parent Facebook

SAN FRANCISCO — The billionaire chief executive of WhatsApp, Jan Koum, is planning to leave the company after clashing with its parent, Facebook, over the popular messaging service’s strategy and Facebook’s attempts to use its personal data and weaken its encryption, according to people familiar …

Privacy

GravityRAT - The Two-Year Evolution Of An APT Targeting India

<i>This blog post is authored by Warren Mercer and Paul Rascagneres.</i><i><br>Update: 4/30 Since the publication of the blog post, one of the anti-VM capability</i> …

Fact vs. Fiction: Understanding the Future of Connected Car Security

They’re on the lookout for malware that can kill

The cyberthreat hunters had honed their chops at the National Security Agency — the world’s premier electronic spy agency. And last fall, they were analyzing malware samples from around the world when they stumbled across something highly troubling: the first known piece of computer software …

Cybersecurity

Researchers Find Way to Create Master Keys to Hotels

When most people rent a hotel room, security is one of the factors they take into consideration. Along with knowing whether the hotel has room …

France creates secure chat app to keep its president off Telegram

Telegram is about to lose some more customers following the Russia ban, albeit for very different reasons. The French government is testing an encrypted messaging app that would keep officials' data on servers inside the country. It's worried about the "potential breaches" that could happen if data …

French Government

Introducing Ember: An Open Source Classifier and Dataset

Over the last decade, machine learning has achieved truly impressive results in fields such as optical character recognition, image labeling, and …

Ransomware, healthcare and incident response: Lessons from the Allscripts attack

On January 18, 2018, at around 2:00 a.m. EST, the security operations center (SOC) at electronic health record (EHR) and practice management software …

The Cyber Threat To Industrial Controls Systems

As technology spreads deeper into almost every facet of business, the government, our military and our personal lives, we are seeing a transition of systems from analog to digital. Unlike analog, digital systems are integrated into networks, which opens up the target surface of systems and …

Does Your Bug Bounty Program Need an Overhaul?

<i>They’ve become mainstream, but bug bounty programs are vast, varied and complicated</i><p>When bugs proliferate, there’s potential for an infestation …

Apple Pay