Cyber Dominance

By Jacob F Davis | The official magazine of CyberDominance.com.

Cyber Perception Center

Welcome to the Cyber Perception Center<p>This one-stop tool can aid you in the Cyber Perception of Reality – that is, to perceive what is happening in …

General Dominance Theory, SECOND EDITION Released

The latest update to General Dominance Theory was released last week. This is the first major update since the original work was published in 2014, …

Researchers use encryption to keep patients’ DNA private

There are a lot of valid security concerns when it comes to genetic testing and keeping your genome under wraps. But researchers at Stanford University have figured out a way to keep the vast majority of your genomic data hidden while looking for disease-associated mutations. The work was recently …

Genetics

Elon Musk leads 116 experts calling for outright ban of killer robots

Open letter signed by Tesla chief and Alphabet’s Mustafa Suleyman urges UN to block use of lethal autonomous weapons to prevent third age of war<p>Some of the world’s leading robotics and artificial intelligence pioneers are calling on the United Nations to ban the development and use of killer robots.<p>…

Artificial Intelligence

MasterCard launches Credit Card with Built-In Fingerprint Scanner

MasterCard has unveiled its brand new payment card that has a built-in biometric fingerprint scanner, allowing customers to authorize payments with …

Scanners

Cyber threat info sharing made easier

The next iteration of STIX, the machine-to-machine cyber threat information-sharing language, is nearing completion.<p>STIX (or the Structured Threat …

Hacker sets off every emergency siren in Dallas

A hacker set off all 156 emergency sirens in Dallas which wailed for 90 minutes overnight.<p>The hacker tricked the system into sending repeated signals 60 times from 11.42 pm until 1.17am on Saturday morning.<p>Rocky Vaz, director of the city's Office of Emergency Management said the hacker was from …

Exploit attacks your smart TV through over-the-air signals

Worries that someone could hijack your TV with a broadcast have been present for decades (ever see <i>The Outer Limits</i>?), and it's clear that they're not going away any time soon. Oneconsult security researcher Rafael Scheel has outlined an attack that can control smart TVs by embedding code into …

Scotiabank Investing $2 Million In Cybersecurity Research

TechMalak <br>Scotiabank Investing $2 Million In Cybersecurity ResearchWith the latest threats posed towards financial institutions, it is not a surprise …

Bay Street

The human behind the hack: identifying individual hackers

Why do hackers do it? On a superficial level, the probable motivations seem obvious: to steal money if they are criminal hackers, to promote …

FBI director says encryption blocked police access to 1,200 devices

FBI Director James Comey on Wednesday said the FBI was having an increasingly difficult time bypassing the security on consumer devices that it had …

Surveillance

Secure computers ‘can be hacked by drones’, experts warn

Some of Britain’s most secure computers could be hacked by hijacking their tiny LED indicators to send secret data to drones, it was claimed …

WordPress Finally Patches 6 Glaring Security Issues

WordPress is the most popular CMS in the world — and the most hacked.<p>Just last month, hackers engaged in a “feeding frenzy” at the expense of …

Information Security

Detect, Analyze, Respond: Attend These Key Talks at InfoSec World 2017

InfoSec World is one of the longest-running information security events in the U.S. Entering its 23rd year, security professionals planning …

Is Your Password Manager's Promise of "Military-Grade" Security Actually True?

Every year, we share reports of people sticking with passwords like “123456” or “p@ssword” making it clear that remembering passwords isn’t an easy …

Phishing Emails Spread Pony Malware

<b>What happened?</b><p>Security experts recently discovered that criminals have begun distributing Pony malware disguised as Microsoft Publisher file …

Microsoft Office

LG’s WebOS 3.5 smart TV platform is the first to be certified by UL as secure

As our TVs continue to get smarter, the potential for things to go wrong only grows. This isn’t a problem exclusive to TVs, but any …

Televisions

IBM Turns Watson Into A Cybersecurity Weapon Amid White House Interest

IBM keeps doubling down on Watson, the company’s heavily marketed cognitive software that has won <i>Jeopardy!</i> and reportedly helped find treatments for patients with cancer. Now IBM’s putting Watson onto the case in the cyber security field.<p>Watson for Cyber Security, announced by IBM on Monday, takes …

Cybersecurity

Voice Privacy in the Enterprise: Are You Listening?

Keyboarding is so last century. Whether we’re asking Amazon Echo how long it’ll take us to get to work, telling the TV to change channels or …

Cisco Annual Cybersecurity Report shows staggering cost of breaches

Read Arianna Gael take a look at how the data breach costs have been rising over the years on File Hippo :<p>Data breaches have been setting new records …

Want to Keep Hackers Out of Gadgets? Try International Law

Imagine this scenario: You're on vacation in the beautiful Austrian Alps, heading out for breakfast, but your room's door won't open. The hotel uses …

6 Data Security and Privacy Tips for 2017

You already know how dangerous a cyber-attack can be. The fact is that thousands of businesses are brought down every year because of completely …

6 of the World’s Biggest Data Security Breaches

Data security is not just a problem for smaller businesses that don’t have the infrastructure to afford an entire security department. Bigger …

Your Local Supermarket Holds the Key to Defending Against Distributed Denial of Service Attacks

<i>How can you defend your service from a distributed denial of service attack? The Answer is at the grocery store. Distribute your service to force</i> …

5 Cybersecurity Tools Your Company Should Have

Smaller businesses are frequent targets for cyber crimes for a simple reason -- they're easy targets.<p>Opinions expressed by <i>Entrepreneur</i> contributors are their own.<p>No business, small or large, can afford to ignore cyber security. According to a recent Verizon Data Breach Investigations Report, 60 …

Cybersecurity

Ransomware Hack Hits Ohio Town's Government

Share Email<p>A virus that infected the computer system of the Licking County government offices in Ohio has shut down the entire network, including …

GCHQ recruits teenagers for summer camps for new generation of spies to fight off Russian cyber-attacks

Security services are recruiting teenagers for summer camps as they attempt to rear a new generation of agents with digital skills that can ward off Russian cyber-attacks.<p>GCHQ are running 2,500 residential courses for teenagers across the country, including "CyberFirst adventurers" one-day event …

Cybersecurity

Report: Spam and cloud attacks rising, 4 steps to protect your business

Cyber attacks via cloud-based applications and spam are on the rise this year, according to Cisco’s 2017 Annual Cybersecurity Report, released …

What's In Store For Global Cyber Security In 2017

2016 was a particularly eventful year in the cyber threat landscape. Nation-state operations played large in the US presidential election, database …