Stu Sjouwerman

209 Flips | 1 Magazine | 8 Likes | 31 Followers | @stuallard | Keep up with Stu Sjouwerman on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Stu Sjouwerman”

Tesla Looks To Hire Hackers To Beat Hackers

Follow Antony<p>The technological advancement of vehicles means the risk of hackers infiltrating myriad electronic systems becomes ever greater. For car …

Why I quit writing internet standards

Advertisement<p>34 Comments<p>Credit: GigaOM<p>My seven years on the Internet Engineering Task Force (IETF), from 2003 to 2010, definitely taught me …

News - Panda Security Mediacenter

• April 26, 2018<p>On May 18, Panda Security will be holding the Panda Security Summit in Madrid, Spain. José Sancho, Panda Security Presidet, will offer …

Microsoft deems the US government an 'advanced persistent threat'

Despite the fact we have been living with the Edward Snowden leaks regarding NSA spying since May, the story remains front page news and continues to …

Seattle hospital discloses malware attack that exposes 90,000 patient records

Personal information of about 90,000 patients of Harborview Medical Center and University of Washington Medical Center was exposed after a malware …

Your AntiVirus Does Not See NSA's Botnet

Turns out the NSA has its own botnet. They infected 50,000 machines, likely using social engineering and spear phishing to do it. Ouch.

Cybersecurity

Edward Snowden Used Social Engineering To Hack NSA

Ex-NSA contractor Edward Snowden used social engineering to get user names and passwords from co-workers at a spy base in Hawaii.

Social Issues

Our Government Has Weaponized the Internet. Here's How They Did It

The internet backbone – the infrastructure of networks upon which internet traffic travels – went from being a passive infrastructure for …

Disassembling the privacy implications of LinkedIn Intro

<b>Update: 17 Feb 2014:</b> Sanity has prevailed and the service has now been pulled.<p>LinkedIn Intro has already become known by many names: A dream for …

Brian Tracy on Twitter: "Learn from the experts; you will not live long enough to figure it all out for yourself. #learnbyexample"

Add this Tweet to your website by copying the code below. Learn more<p>Add this video to your website by copying the code below. Learn more

Biggest Security Threat: Employees

Yes, the cyber threat from criminals and nation states is very real, but when push comes to shove, over 50 percent of businesses consider their own …

Employment

NIST includes component origins in assessing supply chain risk

Security<p>The Obama administration appears to be taking new steps to address concerns about potential vulnerabilities in the IT supply chain. The …

Are Your Email Addresses On A Russian Phishing Site?

Russian Cyber-mafia loads U.S. email addresses onto easily searchable blog for criminal spear-phishing purposes.

Phishing

Whitepaper: Security Awareness Training Effectiveness Report

Not all Security Awareness Training is equal. This whitepaper from Osterman Research shows 5 different types and which one has the best result.

Security

The history of cyber attacks - a timeline

$1.5 million Cyberheist Ruins Escrow Firm — Krebs on Security

A $1.5 million cyberheist against a California escrow firm earlier this year has forced the company to close and lay off its entire staff. Meanwhile, …

NSA by the numbers — BuzzMachine

Fear not, says the NSA, we “touch” only 1.6% of daily internet traffic. If, as they say, the net carries 1,826 petabytes of information per day, then …

Who's susceptible to email phishing attacks? Study says everyone

Asked in a survey to distinguish malicious emails from legitimate ones, nearly everyone in a group of 53 undergraduates failed.<p>The results from a new study by researchers at North Carolina State University found most people are overconfident in their ability to spot phishing attacks directed at …

Identity Theft

Humans still the weakest link as phishing gets smarter and more focused

The latest figures from the Anti-Phishing Working Group (APWG) show a distinct decline in the numbers of phishing sites reported to it, and in the …

Debate: Security Training Effective? What's Your Opinion...

In the August issue of SC Magazine yours truly is one of the two experts that discuss whether security training is an effective strategy in the …

Security

The five scariest hacks we saw last week

If something can connect to a network, it can be hacked. Computers and phones are still popular targets, but increasingly so are cars, home security systems, TVs and even oil refineries.<p>That was the message at this year's Black Hat and DefCon computer security conferences, which took place last …

Which sectors are the biggest threats for data breaches?

Americans are feeling more secure these days, according to the most recent Security Index released by Unisys Corp. But more than 60 percent of those …

Watching Porn on a Mobile …Risky?

Black Hat hacker claims he can make $15k to $20k an hour

Advertisement<p>3 Comments<p>Credit: Thinkstock<p>A lot of what the general public knows about hackers is perpetuated by Hollywood myth and urban legends. …