Mumblehard, The Pernicious →
Swati Khandelwal, writing at The Hacker News, regales us with the tale of Mumblehard, the Linux and BSD Server targeted attack malware that transforms those machines into pernicious spambots.
Swati Khandelwal, writing at The Hacker News, regales us with the tale of Mumblehard, the Linux and BSD Server targeted attack malware that transforms those machines into pernicious spambots.
NIST's Computer Security Division and the Information Technology Laboratory (ITL) along with the NIST Cloud Computing Program has announced hosting of the 8th Cloud Computing Forum and Workshop. Registration Information, etc. can be viewed here. Included with the announcement is the Call for Abstracts, noted below:
Interested? Download the 8th Cloud Computing Forum and Workshop Abstract Submission form, additional information resides here.
"This movie was shot during our 20 days trip to Antarctica in December 2014 to January 2015. We started from Ushuaia in Argentina and went to Port Williams in Chile, rounded Cape Horn and crossed the Drake Passage towards the Melchior Islands in Antarctica. We spent 16 days in the Antarctic and got to experience the most amazing scenery and wildlife before we returned back to Ushuaia. Filmed with GoPro HERO3+ Black Edition and DJI Phantom 2, edited with Final Cut Pro X. Music from Music Bed with rights." via Kalle Ljung
Occasionally, a motion picture makes itself known hereabouts, with absolutely extraordinary visage of a land previously unsullied. This is such a picture. Enjoy!
Arg Maxim: But users, manufacturers, managers, & bureaucrats will be reluctant to implement them for reasons of inertia, pride, bureaucracy, fear, wishful thinking, and/or cognitive dissonance. Compiled by Roger G. Johnston, Ph.D., CPP, Argonne National Laboratory
Yippee Maxim: There are effective, simple, & low-cost counter-measures (at least partial countermeasures) to most vulnerabilities. Compiled by Roger G. Johnston, Ph.D., CPP, Argonne National Laboratory
Considering the country's highly systems-literate populis, this is one of the more interesting cases of a so-called Cybernational Guard, this time, stationed at the K5 Barracks (NATO Cyber Defense Center, Tallinn, Estonia), in quite likely one of the most astoundingly beautiful countries on our planet - Estonia!
News, via Aliya Sternstein, writing at NextGov, details research regarding anti-drone activities fueled by published research. A drone research conundrum, of sorts...
Superb rebuttal co-authored by Robert M. Lee, CAPT USAF (see Captain Lee's personal rebuttal of the NORSE and AEI document here), Michael J. Assante Co-Founder and Chief Security Strategist, NexDefense, Inc., and Tim Conway, ICS and SCADA Technical Training Director at SANS targeting the report entitled "The Growing Cyberthreat from Iran: The Initial Report of Project Pistaschio Harvest" produced by Norse and the American Enterprise Institute. Read it and Weep.
Certainly an eponymous panel of cryptographic scientists, inclusive of Paul Kocher (Moderator) , Adi Shamir, Whitfield Diffie, Ed Giorgio, Ronald Rivest holding forth, as it were...
via David Bisson, writing at Tripwire's State of Security blog, comes a particularly dire warning from Keith Alexander, GEN (RET) USA (RET), holder of a Bronze Star and the 16th Director of the United States National Security Agency, focusing on the security bulwarks of the embattled Energy Sector.
A presentation of Ira Winkler's, from RSA Conference 2014. Over a year old, and interestingly, highly relevant.
via Sara Sorcher, writing at the Christian Science Monitor, for the Monitor's new Passcode department, comes the story of Plan X, the Defense Advanced Research Projects Agency's (DARPA) push into proper management of the cyberwar battlespace.
Voltaire’s Maxim: The problem with common sense is that it is not all that common. Comment: Real world security blunders are often stunningly dumb. Compiled by Roger G. Johnston, Ph.D., CPP, Argonne National Laboratory