Aaron Davies-morris

182 Flips | 3 Magazines | 11 Likes | 1 Following | 18 Followers | @aarondavies7ffl | Keep up with Aaron Davies-morris on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Aaron Davies-morris”

Blockchain Transactions Create Risks for Financial Services

<i>This post was written by Raj Samani and Christiaan Beek of Intel Security, and Shane D. Shook, PhD.</i>Trust is the most valuable commodity in the …

Financial Services

404

We might have found a new bedfellow, but we can't seem to find the page you want. Why not visit our homepage or try reading these instead?

The European Union's case of doublethink: New cybersecurity rules and backdoor dreams

The EU wants critical service providers to ramp up their security -- while in the same breath members are fighting encryption and considering …

Privacy

IBM launches App Exchange to bolster security collaboration

IBM has added 14 applications to the exchange covering user behaviour analytics, endpoint data and incident visualisation

IBM

Spitzer's Blitz

Published: 19 Jan 2005<p>Last Updated: 09 Oct 2013<p>When Eliot Spitzer won election to the attorney general's office for the state of New York in 1998, …

Wall Street

IBM eyes expansion in security market with analytics

IBM has announced the launch of its security analytics platform Security QRadar to allow customers to create rules to identify potential threats, and …

IBM

All businesses share the same cloud security concerns

All organizations have the same key concerns regarding the security of their data in the cloud, according to a new report.<p>The study by …

Google claims a giant leap forward in quantum computing

Researchers from NASA and Google’s AI labs have published what they claim is proof that its controversial D-Wave quantum computer actually works.<p>The …

Quantum Computing

When Toys Are Hackable And Our Children Become Data Breach Victims

As the holiday season enters full swing, one of the hottest toy trends this year is the Internet-connected intelligent toy. Yet, as with everything relating to the Internet of Things, such toys bring with them myriad new security risks that have yet to be fully contemplated and understood. From …

The Future Of The Internet Will Be Discussed In New York, This Week. But Nobody Seems To Care

Government officials from more than 190 countries will meet next Tuesday in New York for a two-day discussion (the United Nations’ 10 Year Review of the World Summit on the Information Society, or WSIS+10 Review) that could, in principle, have a huge influence on how the Internet is governed for …

Yahoo is now part of Oath

Before you continue...<p>Yahoo is now part of the Oath family. Due to EU data protection laws, we (Oath), our vendors and our partners need your consent …

HP security chief: How big data can catch hackers red-handed

Firewalls and antivirus software bite deepest into most organisations' security budgets to the detriment of the other stages in the breach …

BYOD And The Issues Surrounding Cloud Storage

As BYOD increases and <b>employees increasingly use personal laptops, smartphones and mobile devices</b> for work purposes, concerns over data security and …

You Have No Control Over Security on the Feudal Internet

Facebook regularly abuses the privacy of its users. Google has stopped supporting its popular RSS feeder. Apple prohibits all iPhone apps that are political or sexual. Microsoft might be cooperating with some governments to spy on Skype calls, but we don’t know which ones. Both Twitter and LinkedIn …

TPPA requires members to follow copyright takedowns

Wikileaks has released what it says is the final text of the secretive Trans-Pacific Partnership Agreement, a “free trade” deal between the United States and eight other countries.<p>The text contains an interesting provision in the Intellectual Property Rights chapter regarding ISPs and their …

Trans-Pacific Partnership

Healthcare Information: the New Terrorist Target

<b>April 2013</b><p><b>Healthcare Information: the New Terrorist Target</b> <b><br>By Julie Knudson</b> <b><br>For The Record</b> <b><br>Vol. 25 No. 6 P. 10</b><p><i>As the industry moves into the digital</i> …

Cybersecurity

Edward Snowden says UK spies can send 'Smurfs' to hack into your phone and gain 'total control' over it

Snowden told the BBC that GCHQ has something called "Smurf suite," which is a collection of spying programs that the agency can use to hack into the phones of suspected terrorists.<p>One tool is called "Dreamy Smurf." Snowden says it allows GCHQ to turn on mobile phones without the user knowing. …

Quarter of firms can't tell how hackers get in

The majority of large companies have experienced a breach over the past twelve months, but almost a quarter, 23 percent, of firms do not know how the …

Into the spotlight: Cyberinsurance

Data that can be monetized is, simply put, a magnet for the bad guys. No matter whether your organization is big or small, if you have desirable …

Cambridge University

Hacking Wireless Printers With Phones on Drones

You might think that working on a secured floor in a 30-story office tower puts you out of reach of Wi-Fi hackers out to steal your confidential …

No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy

Amazon Inspector Finds Security Issues For You

Today at Amazon re:invent, Amazon announced a new service called Amazon Inspector that analyzes your AWS instances and reports back with any security or compliance issues it finds.<p>This provides a valuable service for Amazon customers who may be worried about security, especially those that are new …

The fake LinkedIn recruiter network hackers are using to reel in business users

Hackers known to use Zeus malware to hack critical infrastructure targets have developed an elaborate network of fake recruiter profiles for phishing …

Tens of thousands of medical devices are exposed to hackers

Thousands of critical medical systems such as MRI machines, completely out in the open and vulnerable to a hacker’s attack, have been exposed online, …

Medical Technology

Cisco acquires Portcullis to boost security consultancy business

The buyout increases Cisco's strength in the security consultancy realm.<p>Cisco has snapped up UK firm Portcullis to cater for increased demand for …

Financial Services

Car Hack Technique Uses Dealerships to Spread Malware

Over the last summer, the security research community has proven like never before that cars are vulnerable to hackers—via cellular Internet …

Scottrade Alerts 4.6 Million Brokerage Customers of Breach

Following news this week that hackers stole data on 15 million T-Mobile customers comes a new report that 4.6 million customers of the St. …

Linux-powered botnet generates giant denial-of-service attacks

Linux won the day as the more secure alternative to Windows, but now its popularity has made it vulnerable, according to Akamai.<p>Malware that has …

Information Security