Keyword: cyberspace
-
Netgear has patched serious security vulnerabilities in its DGN2200v1 network router, following the discovery of "very odd behaviour" by a Microsoft security research team - a somewhat understated way of saying that attackers can gain "complete control over the router."
-
Behind his image as a straight-laced tech mogul, Bill Gates was notorious for throwing naked pool parties with strippers and being a “womanizer” — even after meeting future wife Melinda, according to a biography. The Microsoft co-founder’s wild lifestyle was well known among his inner circle — but newspapers like the New York Times hid the unflattering reports to continue getting “spoon-fed stories,” James Wallace wrote in the 1997 biography, “Overdrive: Bill Gates and the Race to Control Cyberspace.” They “didn’t report on the wild bachelor parties that Microsoft’s boyish chairman would throw in his Seattle home, for which Gates...
-
Set designers were finally able to draw fans into their vivid dream without the constraints of Newtonian physics. Yet virtual reality isn't all wonder.Pandemic lockdowns crushed the concert industry, but things are finally starting to move again. Many of us are optimistic that dense crowds might gather regularly by mid-autumn. The process is already starting in red states. Once everybody who’s anybody “takes the jab,” mass events should spread slowly across the country.All over the world, people are dying for another taste of what Émile Durkheim called “collective effervescence”: the intense thrill we get from a mass gathering with a...
-
Assistant Attorney General Brian A. Benczkowski Delivers Remarks at the “Justice in Cyberspace†Symposium Washington, DC  ~ Wednesday, February 5, 2020 Remarks as Prepared for Delivery  Good afternoon.  Thank you, Richard, for that kind introduction.It is a privilege to address this year’s symposium, and I want to thank American University’s Washington College of Law for their collaboration on this important event.This year’s theme is “Justice in Cyberspace,†and I want to spend some time talking about what that means for the Department of Justice and the Criminal Division.Let’s start with “Justice.â€Â The Robert F. Kennedy Building, where I work, is a...
-
President Trump may not block even rude or obnoxious criticism from his Twitter account, because it is a public forum that is protected by the First Amendment, US District Court Judge Naomi Reice Buchwald has ruled. The President’s use of his Twitter account to comment on important policy, personnel and personal announcements made it a public forum, akin to a park or town square, she concluded.Blocking unwanted tweets is thus viewpoint discrimination, which public officials are not permitted to engage in. Indeed, his Twitter account is not just a public forum. It is also “government space,” and thus may not...
-
Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather. We have no elected government, nor are we likely to have one, so I address you with no greater authority than that with which liberty itself always speaks. I declare the global social space we are building to be naturally independent of the tyrannies you seek to impose on us. You...
-
President Barack Obama reportedly told Russian President Vladimir Putin in October that directly interfering with the U.S. election could result in an "armed conflict." According to NBC News, Obama opted to use the red phone to contact Moscow directly, a communication system that dates back to the Cold War. It's not an actual telephone, but instead sends a secure email message between the two countries. "International law, including the law for armed conflict, applies to actions in cyberspace," part of the Oct. 31 message read, according to NBC. "We will hold Russia to those standards."
-
When President Trump and President Xi Jinping meet for the first time next month, exploring avenues for further constructive cyberspace cooperation between China and the United States should be amongst the issues they discuss The arcane issue of cybersecurity has received front page media attention of late. Most recently, WikiLeaks published documents which purport to show, according to WikiLeaks, “the scope and direction of the CIA’s global covert hacking program.” The program is comprised of a “malware arsenal and dozens of ‘zero day’ weaponized exploits against a wide range of U.S. and European company products…which are turned into covert microphones.”...
-
The Justice Department is set to announce Wednesday the indictments of two Russian spies and two criminal hackers in connection with the heist of 500 million Yahoo user accounts in 2014, marking the first U.S. criminal cyber charges ever against Russian government officials. The indictments target two members of the Russian intelligence agency FSB, and two hackers hired by the Russians. The charges include hacking, wire fraud, trade secret theft and economic espionage, according to officials, who spoke on the condition of anonymity because the charges have not yet been announced. The indictments are part of the largest hacking case...
-
Is St. Louis at the center of a cyber attack from China? A company that monitors threats on the internet shows a large amount of traffic headed into the area from China. According to Norsecorp’s Twitter profile they offer, “Live threat intelligence & unmatched visibility into the darkest corners of the Internet.” A map on the company’s website shows a lot of activity coming from locations in china to IP addresses located mostly in St. Louis, Kirksville and Seattle. The majority of targets listed in the map are located in the US with origins in China.
-
Lost in Cyberspace – As Seen in a Commercial By: Msgr. Charles PopeFor most people, the word virtual has come to mean the Internet or the computer world, as in “occurring or existing primarily online.â€Â But the word virtual has an original meaning that is actually quite descriptive of a modern problem.Prior to its application to the computer world, the word virtual meant “being something in effect, though not actually or expressly being such.†In other words, if something is virtual it has aspects of the real thing but is not the real thing. In the sentence “The man is a virtual goldmine...
-
The CIA official who led the hunt for Osama Bin Laden is being removed from his post, it has been revealed. The head of the agency's Counterterrorism Center, who also directed drone campaigns which killed thousands, has been in the position for nine years and is described as a 'true hero'.
-
China said on Monday it opposed all forms of cyberattacks but there was no proof that North Korea was responsible for the hacking of Sony Pictures, as the United States has said. North Korea has denied it was to blame and has vowed to hit back against any U.S. retaliation, threatening the White House and the Pentagon. The hackers said they were incensed by a Sony comedy about a fictional assassination of North Korean leader Kim Jong-un, which the studio has pulled.
-
"IRAN SPY NETWORK 30,000 STRONG Pentagon report: Iranian intelligence linked to spying, terror attacks" SNIPPET: "Iran’s intelligence service includes 30,000 people who are engaged in covert and clandestine activities that range from spying to stealing technology to terrorist bombings and assassination, according to a Pentagon report." SNIPPET: "“MOIS provides financial, material, technological, or other support services to Hamas, Hezbollah, and al Qaeda in Iraq (AQI), all designated terrorist organizations under U.S. Executive Order 13224,” the report said. The spy service operates in all areas where Iran has interests, including Afghanistan, Iraq, Kuwait, Lebanon, Central Asia, Africa, Austria, Azerbaijan, Croatia, France,...
-
SNIPPET: "Social media is no longer simply a fun way to share updates on the harmless idiosyncrasies of our lives. It can undermine national security, and there ought to be a more robust discussion between the Bay Area technology world and Washington on what to do about it. Cyber-terrorism, especially the potential for electronic tampering with U.S. industrial or military installations, is a paramount national security threat that Washington is working to forestall. We're all working to protect our accounts from hackers. But the cyber-threat getting far less public attention involves the social media networks we use every day and the...
-
A key Senate panel approved legislation Thursday that would require police to obtain a search warrant from a judge before they can read a private citizen's emails, Facebook messages or other electronic communications. The revised Electronic Communications Privacy Act (ECPA) passed by the Senate Judiciary Committee will now move on to the full Senate for a vote. Passage would be a victory for privacy advocates, who say current privacy rules have been left in the dust by technological progress. Committee Chairman Sen. Patrick Leahy (D-Vt.), who played a key role in drafting the original bill, has called the existing law,...
-
<p>The Fourth Amendment to the U.S. Constitution was written in order to keep the government from invading the right to be left alone--today known as the right to privacy. The Framers who wrote the Constitution, and Jefferson and his colleagues who insisted on the Fourth amendment among others, had suffered grievously at the hands of the British king and his soldiers.</p>
-
SNIPPET: "New York City is the center of a public uproar as Internet blogger Pamela Gellar rises with an “anti-jihad” ad campaign." SNIPPET: "Gellar and her group are protesting the Jihad, which in definition is the religious duty of Muslims. According to the Dictionary of Islam, jihad is defined as “A religious war with those who are unbelievers in the mission of Muhammad . . . enjoined especially for the purpose of advancing Islam and repelling evil from Muslims.” The literal meaning of jihad, according to the British Broadcasting Network, “is struggle or effort, and it means much more than...
-
We’re always hearing about high-end cyber epionage but sometimes, enemy spies can steal military secrets without investing a ton of time or money breaking into Pentagon networks. In fact, Chinese spies just used a fake Fasebook account to get personal information from a ton of NATO officials. Yup, Chinese spies set up a face Facebook page for Adm. James Stavridis, chief of U.S. European Command and fooled a bunch of high-ranking military officials into friending the fake admiral and sharing info with them. This is a pretty common move, just a couple of weeks ago I had a conversation with...
-
The White House on Thursday is expected to unveil its proposal to enhance the nation's cybersecurity, laying out plans to require industry to better protect systems that run critical infrastructure like the electrical grid, financial systems and nuclear power plants. The Obama administration also is insisting that companies tell consumers when their personal information has been compromised. According to cybersecurity experts familiar with the plan, the administration's proposed legislation also would instruct federal agencies to more closely monitor their computer networks. Several House and Senate committees have been working on cybersecurity legislation for the past two years, while waiting for...
|
|
|