Behold, Ladies and Gentlemen, an erudite paper detailing the notion of the eTerrorist, written by Professor Christina Schori Liang has made it's way into my my somestimes overloaded sphere of cogitatory field of vision. Well wrought, indeed! Professor Liang is leading The Terrorism and Organized Crime Cluster at the Geneva Centre for Security Policy and is a Visiting Professor at The Paris School of International Affairs.
In Public Sector or Private Sector, or simply interested in what very well may be the next evil surfactant in the Sea of Evil flotsam, jetsam, lagan, and derelict floating upon the Interwebs, pay attention and read Professor Liang's short, but enlightening work.
Lisa Forte, a Partner at UK based Red Goat Cyber Security, regales us with a tremendous blog post - detailing, if you will, the effort expended in executing reconnaissance operation targeting the focus of a social engineering mission. Quite likely the best prose you'll feast your eyes upon today, I'll wager.
Oleg Afonin, writing on Elcomsoft's blog, confirms Apple Inc.'s (NasdaqGS: AAPL) iOS USB Restricted Mode on the latest version release of iOS is configured by default to disallow connectivity through the device's USB port after the device is locked for one hour (as depicted in the screen shot above, the USB toggle is off). This may be troublesome for law enforcement's capability to garner data and ostensibly creates a 'golden hour' of data seizure capabilities by LE; Apple has published a support page with details of the process.
via Christian Priebe of Imperial College London, Manuel Costa and Kapil Vaswani both from Microsoft Research, comes a tour dé force of database security, ostensibly monikered EnclaveDB (published this past May 2018, in the Proceedings of the 39th IEEE Symposium on Security & Privacy, in co-operation with the International Association for Cryptologic Research). The interesting functionality descibed in the trio's paper - pursuant to a secure database (if there possibly could be such a thing) is not the security of data in-motion or at-rest, but the addition of encrypted in-memory data. More here...