beuchelt

50 Flips | 2 Magazines | 8 Likes | 2 Followers | @beuchelt | Keep up with beuchelt on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “beuchelt”

French satellites sold to UAE may contain backdoored components

UAE wants terminate a contract with French companies for the supply of two Falcon Eye spy satellites due the presence of security compromising …

ASSESSMENT: DPRK Networks and CNO Capacities

ASSESSMENT: DPRK Networks and CNO Capacities<p><b>DPRK INTERNET AND INTRANET:</b><p>As the DPRK under Kim Jung Un has been poking the global bear lately with …

Security warnings do better if they use scammers’ tricks, research finds

There’s been much fiddling around with security warnings to see which versions work best: should they be passive and not require users to do …

Finland's Ministry of Foreign Affairs hit by extensive cyber espionage

Finland’s foreign minister Erkki Tuomioja confirmed the shocking news, a large hacking attack targeted the The Finnish Ministry of Foreign Affair …

Lenovo Computers Banned by the 'Five Eyes' Spy Agencies

The ban was apparently implemented soon after Lenovo purchased IBM's PC business in 2005. According to a report in the <i>Australian Financial Review</i> …

U.S. Court to Decide Whether National Security Trumps Foreign Investment and Due Process

In the global economy, one of the great prizes is the capital and boost to a country's economy provided by Chinese foreign investment. The importance …

China

The EU’s hacker legislation mirrors the US Computer Fraud and Abuse Act

NakedSecurity reports today that “The European Parliament last week approved a draft of the proposal and will vote on it in July.” In fact it was the …

English - Global

This article discusses our project that involved searching for vulnerabilities in implementations of the OPC UA protocol. We hope to draw the …

Cybersecurity

Congress looks to punish state-sponsored hacker spies

A new bipartisan bill will aim to punish foreign day backed by China, Russia and other nation-states by freezing their assets and deporting them out …

HACKED! - Four Corners

<b>"HACKED!" - Monday 27 May 2013</b><p>While debate rages over Australia's border security, there's growing evidence that the greatest threat to Australia's …

DNS anomaly detection: Defend against sophisticated malware - Help Net Security

Not so long ago, the standard way of looking for a malware infection was to simply monitor web traffic. By looking, for example, for HTTP requests to …

Cybersecurity

Reports

The founder of <b>Liberty Reserve</b>, a digital currency that has evolved as perhaps the most popular form of payment in the cybercrime underground, was …

Hacking with new DIY Google Dorks based hacking tool

<b>A new version of DIY Google Dorks based hacking tool has been released, it is an extremely useful tool for reconnaissance of targets.</b><p>A Webroot blog …

29C3 Chaos Communication Congress.What do USB memory sticks say?

The <b>Chaos Communication Congress</b> is an annual meeting of international hackers organized by the Chaos Computer Club (CCC), one of the world’s biggest …

Mideast sabotage threats target US energy sector

The <i>New York Times</i> and the <i>Washington Post</i> are reporting that federal officials and the Department of Homeland Security have warned that they have …

Organizations fail to realize the implications of a data breach - Help Net Security

New research by the Ponemon Institute revealed that 54 percent of respondents have experienced at least one data breach in the last year, with nearly …

Cybersecurity

China vs US mutual accusations, the cyber cold war is begun

China and US governments continue to exchange accusations about the continuing incursions into the respective national networks.<p>China and US …

Resilience ‒ The way to Survive a Cyber Attack

The claim that any Western, information technology dependent society could be brought down by a fifteen-minute cyber attack has recently provoked …

IBM takes a big new step in cryptography: practical homomorphic encryption

IBM just released an open source software package called <b>HELib</b>.<p>The HE stands for <b>homomorphic encryption</b>.<p>Although it doesn’t sound terribly sexy or …

Defense contractor under cyberattack for three years

Most, if not all, of the intellectual property of a U.S. defense contractor whose forte includes spy satellites and drone aircraft, was apparently …

Cybersecurity

58% Information Security Incidents Attributed to Insider Threat

“The genie of company data,” Guy Bunker, Senior vice president of products at Clearswift, suggested to <i>Infosecurity</i>, “is out of the bottle. In the old …

How to rate a comparative anti-virus test – a six-step guide

In my last article, I discussed anti-virus tests, particularly certification schemes. Today I’ll focus on comparatives and group tests.<p>This is a much …

Taiwan: Chinese cyber-army swells to 100K, hits Taipei hundreds of times per day

Further, the NSB warned that the activity is shifting from targeting government institutions to spying on civilian think tanks, telecom operators, …

How secure is your confidential data? - Help Net Security

It seems ages ago that companies were first warned about the danger of confidential information being found in trash bags in front of the office, yet …

Information Systems

Verizon DBIR: State-sponsored espionage targets large and small organizations

But the targets for espionage aren't just the giant corporations and government entities of the world: The Verizon 2013 Data Breach Investigations …

Free firewall configuration search tool - Help Net Security

SolarWinds released its new Firewall Browser free tool, which enables IT professionals to easily troubleshoot firewalls and manage change requests …

Linux