Andrea Rigoni

65 Added | 1 Magazine | 4 Likes | 7 Following | 24 Followers | @andrearigoni | Keep up with Andrea Rigoni on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Andrea Rigoni”

Getting started with Google Cardboard

Find out how to build or buy this unlikely VR headset, then make your first forays into the virtual world.<p>It sounds made up: Your smartphone, a couple of plastic lenses, and some strategically cut cardboard come together to form a virtual reality headset.<p>Yet that's the, er, reality of Google …

Virtual Reality

The Brainstorm Begins: Initial Ideas for Evolving ICANN - The Governance Lab @ NYU

The ICANN Strategy Panel on Multistakeholder Innovation (MSI Panel) is underway working to curate a set of concrete proposals for ways that the …

GCHQ surveillance: Germany blasts UK over mass monitoring

The German government has expressed the growing public anger of its citizens over Britain's mass programme of monitoring global phone and internet …

NSA: 'Over 50' Terror Plots Foiled by Data Dragnets

The director of the National Security Administration today told Congress that more than 50 potential terrorist attacks have been thwarted by two …

Amazon's Invasion of the CIA Is a Seismic Shift in Cloud Computing

The rumors are true. Amazon is providing cloud services to the CIA. But what's most intriguing about the multi-million-dollar deal is not what Amazon …

NSA Implementing 'Two-Person' Rule To Stop The Next Edward Snowden

The next Edward Snowden may need a partner on the inside.<p>On Tuesday, National Security Agency Director Keith Alexander told a congressional hearing of the Intelligence Committee that the agency is implementing a “two-person” system to prevent future leaks of classified information like the one …

FISA request roundup: Who has Uncle Sam asked to see your data, and how often?

As much as the federal government would like it to, the public outrage at the scope of its PRISM program has yet to die down, despite any good the program may have served in the interests of national and local security. The revelations made by Edward Snowden have cast a bright light on the powers …

European Commission - PRESS RELEASES - Press release - Speech: The politics of the completing the telecoms single market

European Commission<p>Neelie Kroes<p>Vice-President of the European Commission responsible for the Digital Agenda<p>The politics of the completing the …

Pentagon report: Chinese hackers accessed F-35B and other advanced US weapons systems

Many of the Pentagon's most advanced weapon systems -- including the F-35 Joint Strike Fighter and PAC-3 Patriot missile system -- were compromised by Chinese hackers, according to a classified document obtained by the <i>Washington Post</i>. The list of weapons was part of an earlier DoD report condemning …

Could hackers destroy the U.S. power grid?

Although critics say reports of cyber attacks are overblown, energy providers tell a more harrowing story<p>Dozens of U.S. energy providers face "daily, constant or frequent" attempted cyber attacks, according to a new Congressional review of power grid safety. In an extreme case, one utility provider …

Is government on the wrong road with cybersecurity?

Cybersecurity<p>NSA's Chris Inglis offered a recipe for heartbreak at a CSIS event. (NSA photo)<p>The calls to improve cybersecurity grow louder by the …

North Korean cyber-rattling

AMERICANS have grown accustomed to North Korean nuclear petulance. Now they are learning to live with its cyber sabre-rattling. Earlier this month …

'Meta-leadership' and cybersecurity

When tragedy struck the Boston Marathon, law enforcement and national security officials sifted through untold amounts of information and identified suspects within three days. Data came from literally everywhere: video from business-owned cameras; individual bystanders’ cellphone pictures, …

We're sorry, that page can't be found.

Check our Archive page for links to previous Administration websites.<p>Check the URL and change any upper case letters to lower case. URLs on …

Security alert: notes from the frontline of the war in cyberspace

A short, handsome man bounces outside the colossal courthouse on Walnut Street, Newark, New Jersey. He's doing it to keep warm – it is freezing today …

Hacking the Smart Grid - MIT Technology Review

The hurried deployment of smart-grid technology could leave critical infrastructure and private homes vulnerable to hackers. Security experts at the …

Cybersecurity

ICS-CERT Tips for Critical Infrastructure to Avoid Shamoon

Most publicly known malware attacks are disruptive in nature, for example causing the interruption of online banking services or taking websites …

The worst possible cybersecurity breaches could be far worse than you imagined

The cyber-ruffians who briefly tanked the stock market recently by faking a news tweet about an attack at the White House showed how much damage can be done with a few well-placed keystrokes. Those who hacked into a Department of Labor website earlier this week could have wreaked even more havoc, …

Cybersecurity

Is UK doing enough to protect itself from cyber attack?

http://vod-pro-ww-live.akamaized.net/mps_h264_hi/public/news/uk/974000/974338_h264_1500k.mp4?__gda__=1524639477_088f7a1daff7bb732d289383fb8d2eb8<p><b>In 2010 the British government designated the protection of computer networks as one of the country's most important national security priorities. In its</b> …

Cybersecurity

Twitter warns news organisations over hacking amid Syrian attacks

<b>News organisations including the BBC have been warned by Twitter to tighten security in the wake of several high-profile hacks.</b><p>The Guardian became the latest publication to be hit by a group calling itself the Syrian Electronic Army.<p>A previous attack on the Associated Press caused stocks to …

Social Media

Former Obama CTO slams Twitter over lack of two-factor authentication | V3

The chief technology officer of the Barack Obama re-election campaign has branded Twitter “ridiculous” for not offering two-factor authentication …

CISPA Is Dead, Long Live CISPA

This article is from the archive of our partner .<p>After stirring up trouble for months, the Cyber Intelligence Sharing and Protection Act (CISPA) died …

Even After Hacks And Bombings, Privacy Advocates Have Big Week In Congress

In light of the AP’s high-profile Twitter hacking and a vicious domestic bombing, Americans have not let fear derail privacy legislation. Just this week, the Senate advanced an anti-email snooping law and the controversial Cyber Intelligence Sharing and Protection Act (CISPA) is reportedly on its …

Pro-Assad Syrian hackers launching cyber-attacks on western media

The Guardian has come under a cyber-attack from Syrian hackers who have targeted a series of western media organisations in an apparent effort to …

Why the ‘i’ in iPhone Will Stand For ‘Identity’

The “i” in the next iPhone will stand for “identity.”<p>When people hear rumors and read about Apple’s patents for NFC, they think: “Oh, good, the iPhone will be a digital wallet.”<p>When they hear rumors about fingerprint scanning and remember that Apple bought the leading maker of such scanners, they …

Identity Theft

Researcher's Serial Port Scans Find More Than 100,000 Hackable Devices, Including Traffic Lights And Fuel Pumps

You probably remember serial ports as the ancient nine-pin plugs you once used to hook up your mouse or joystick to your computer in the pre-USB dark ages. But tracking down devices that still use serial port connections isn’t so hard, it seems. In fact, according to H.D. Moore, any hacker can …

What a DDoS Attack Looks Like

When hackers do cyber-battle, there isn't much to see. Maybe you'll wind up on a crashed website, but the real carnage is happening behind the …

InfoSec 2013: MoD Warns Cyber Attack Could Bring Down Government

Head of information security at MoD tells TechWeek he isn’t over-hyping the threat<p>If the Ministry of Defence (MoD) suffered a serious cyber attack, …

Google joins the FIDO Alliance, supports its two-factor authentication standard

Google's already investing in two-factor authentication, but it's making a bigger commitment to the security method by joining the FIDO (Fast IDentity Online) Alliance's board of directors. Founded in-part by heavyweights Lenovo and PayPal, the group envisions a future where an open standard …

CISPA suffers setback in Senate citing privacy concerns

A Senate committee chairman said the cybersecurity bill passed by the House is "important," but its privacy protections are "insufficient." A new report suggests separate bills will be drafted.<p>The Senate will almost certainly kill a controversial cybersecurity bill, recently passed by the House, …

Senate Committees