willowtech

18 Flips | 1 Magazine | 9 Following | 11 Followers | @willowtech | Keep up with willowtech on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “willowtech”

Deception: A Convincing New Approach to Cyber Defense

How defenders in a US national security agency capture-the-flag exercise used an endless stream of false data across the network to thwart attackers …

Cybersecurity

Plot by hackers to cheat Singapore firm foiled by bank | Malay Mail

SINGAPORE, Aug 29 — But for the intervention of United Overseas Bank (UOB), Muralidaran Naidu’s company would have been fleeced of US$75,000 …

Russia's 'Fancy Bear' Hackers Used Leaked NSA Tool to Target Hotel Guests

Appropriately paranoid travelers have always been wary of hotel Wi-Fi. Now they have a fresh justification of their worst wireless networking fears: …

Hackers Show How Smart Devices Could Use Sonar to Spy On You

A team of student hackers have demonstrated a method for using music to turn smart devices into tools for spying. The system is based on sonar, and …

North Korea believes Japan is building a cyberspace attack force under the pretext of self defence

North Korea has accused Japan of building a <b>cyberspace attack</b> force in its military under the pretext of self-defence, the media reported.<p>North Korean …

Code chunk in Kronos malware used long before MalwareTech published it | Ars Technica

Marcus Hutchins, the researcher who stopped WCry, complained his code was lifted.<p>A chunk of code found in the Kronos bank-fraud malware originated …

Hackers turning to Tor network to hide evolved malware, warns Kaspersky Lab | V3

Criminals plan to release a fresh wave of advanced cyber attack campaigns using the anonymising Tor network, according to Kaspersky Lab.<p>Kaspersky Lab …

Cybersecurity

RSA's Amit Yoran: Security is Stumbling Around in the Dark

Amit Yoran clearly knows a good metaphor when he sees one. Or in this case, doesn’t see one. Yoran, who was named RSA Security's president last fall, …

Oops! Train control centre passwords revealed on BBC TV

Author:<p>Published<p>in Privacy 12<p>A BBC documentary revealed more than it planned this week, exposing the passwords used at a rail control centre.<p>Nick …

IT security

4 key cyber-security trends to watch

The RSA show this past week in San Francisco was quite a gathering. Having attended RSA every year for the past 10, I’d say this was the biggest and busiest show yet. This is not surprising, given all the activity lately in the cyber-security and cyber-crime areas. Based on the many meetings I had …

Covert channels - (Mis)Using ICMP protocol for file transfers with scapy

Hello w0rld. In this post I will show how it is possible to (mis)use ICMP protocol for file transfers with scapy.<p>“In computer security, a covert …

A portable router that conceals your Internet traffic

Def Con presentation unveils OPSEC tool for the rest of us—some assembly required.<p>The news over the past few years has been spattered with cases of …

Richard Bejtlich on Twitter: "Can't wait to read http://t.co/CGHZD9DnZE edited by @jason_healey of @atlanticcouncil. First cyber conflict history. http://t.co/Xp0WBC3qyN"

Add this Tweet to your website by copying the code below. Learn more<p>Add this video to your website by copying the code below. Learn more

What is APT?

APT stands for advanced persistent threat. It became famous following a New York Times exposé detailing a month’s long attack campaign in which a …

Boundless Informant: the NSA's secret tool to track global surveillance data

The National Security Agency has developed a powerful tool for recording and analysing where its intelligence comes from, raising questions about its …

Here's a Good Reason to Encrypt Your Data

There's many reasons to password-protect – or encrypt – one's digital data. Foremost among them is to protect it during a security breach.<p>Another top …

When Your Data Is Currency, What Does Your Privacy Cost?

There was considerable mouth-dropping from publications such as <i>The New York Times</i> at initial reports this week that NSA programs are gathering both telephone records and information gleaned from large tech companies like Google and Microsoft. But as those reports have settled in, reactions have …