Tags » CyberSecurity

The five Black Hat 2015 must-see events

Next week is the Black Hat 2015 conference in Las Vegas. Last year, more than 9,000 security pros attended to learn the latest cybersecurity buzz, vulnerabilities, and infiltration techniques. 662 more words

Cybersecurity

Explainer: Hacking Team's Reach in the Americas | AS/COA

At least 45 countries have used Hacking Team’s services, according to Privacy International, and seven are from the Americas: Chile, Colombia, Ecuador, Honduras, Mexico, Panama, and the United States.

36 more words
Latin America

This Gadget Hacks GM Cars to Locate, Unlock, and Start Them - ANDY GREENBERG: 07.30.15 7:00 AM

GM’s Onstar service offers some of the most futuristic features on any connected car, including the ability to locate the vehicle, unlock it, and even start its ignition—all from a smartphone app. 372 more words

Tech

Datuk Seri Najib Bank Account Conspiracy Issues, Latest Evidence from Malaysia Ex Deputy Prime Minister

Tan Sri Muhyiddin Yassin Barisan Nasional drop out, after non co-operation with Prime Minister Najib Razak in their political coalition. PM Najib, decided to remove from his cabinet, after weak political relationship between them. 386 more words

Checked Out - By Siva Vaidhyanathan - JULY 28 2015 11:11 AM

The Library of Congress has let itself become obsolete. It needs a new leader who can steer it into the digital age.

Last month, Librarian of Congress James Billington announced that he will resign as of Jan. 394 more words

Government

China Pushes to Rewrite Rules of Global Internet - By James T. Areddy July 28, 2015 3:49 p.m. ET

SHANGHAI—As social media helped topple regimes in the Middle East and northern Africa, a senior colonel in the People’s Liberation Army publicly warned that an Internet dominated by the U.S. 325 more words

Cyber Related

Major issue with Android phones that could be exploited by hackers

This NPR article is a good read for Android users.  With the pervasiveness of mobile technology in our lives, it is important that we continue to think about how this impacts our security. 7 more words

Cybersecurity