Tag Archive for: acts

Eurovision, acts of war, and Twitter circles • Graham Cluley


Smashing Security podcast #321: Eurovision, acts of war, and Twitter circles

Twitter shares explicit photos without users’ permission, one US company can look forward to a $1.4 billion payout seven years after an infamous cyberattack, and how might hackers target Eurovision?

All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by cybersecurity reporter John Leyden.

Plus don’t miss our featured interview with Outpost24’s John Stock.

Hosts:

Graham Cluley – @gcluley
Carole Theriault – @caroletheriault

Guest:

John Leyden – @jleyden

Episode links:

Sponsored by:

  • Bitwarden – Password security you can trust. Bitwarden is an open source password manager trusted by millions of individuals, teams, and organizations worldwide for secure password storage and sharing.
  • Kolide – Kolide ensures that if your device isn’t secure it can’t access your cloud apps. It’s Zero Trust for Okta. Watch a demo today!
  • Outpost24 – Understand your shadow IT risk with a free attack surface analysis.

Support the show:

You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.

Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!

Follow us:

Follow the show on Twitter at @SmashinSecurity, or on Mastodon, on the Smashing Security subreddit, or visit our website for more episodes.

Thanks:

Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.

Found this article interesting? Follow Graham Cluley on Twitter or Mastodon to read more of the exclusive content we post.


Graham Cluley is a veteran of the anti-virus industry having worked for a number of security companies since the early 1990s when he wrote the first ever version of Dr Solomon’s Anti-Virus Toolkit for Windows. Now an independent security analyst, he regularly makes media appearances and is an international public speaker on the topic of computer security, hackers, and online privacy.
Follow him on Twitter at @gcluley, on Mastodon at @[email protected], or drop him an email.

Source…

Know This: Hack Attacks are Acts of ‘Unrestricted Warfare’


Constant cyberattacks against U.S. military and civilian targets from foreign adversaries need to be treated as acts of war and addressed comprehensively, not in isolation.

Cyberspace is a global battlefield that blurs national boundaries. The current fragmented state of U.S. cyber defenses is a hacker’s dream. Before 9/11, the nation’s effort against Al Qaeda was siloed between the CIA and the FBI without communication. A similar situation persists in U.S. cyberdefenses.

An improved response requires integrated cooperation among the Defense Department’s Cyber Command, Department of Justice, states, and industry to formulate a comprehensive strategy to harden our infrastructure and protect state secrets from intruders.

“The line between nation-state and criminal actors is increasingly blurry as nation-states turn to criminal proxies as a tool of state power, then turn a blind eye to the cybercrime perpetrated by the same malicious actors,” Mieke Eoyang, Deputy Assistant Secretary of Defense for cyber policy, told a subcommittee of the House Armed Services Committee last week. “China is the pacing threat to the Department [of Defense]. China uses cyber operations to erode our military overmatch and economic vitality, stealing U.S. intellectual property and research.”

In 2019, Chinese state-sponsored hackers belonging to the APT41 group hacked software development companies, telecommunications providers, social-media companies, video game companies, healthcare, non-profit organizations, think tanks in the U.S. and in about half a dozen other countries worldwide.

The FireEye cybersecurity firm noted in 2019 that these Chinese espionage hackers targeted companies whose capabilities align with the Chinese Communist Party’s Five-Year economic development plans.

Chinese hackers also have stolen plans for the F-35 fighter and sensitive U.S. Navy undersea warfare plans.

The ransomware attack by the DarkSide hacking group against Colonial Pipeline, Co., stands as a reminder of the catastrophic bipartisan failure to take the cyberwarfare being waged against America seriously and strategically. Colonial Pipeline paid $90 million in Bitcoin to the hackers.

It showed how…

Source…

Georgia university: FBI finds no illegal acts in data breach – CBS46 News Atlanta


CBS46 News Atlanta

Georgia university: FBI finds no illegal acts in data breach
CBS46 News Atlanta
Officials at a Georgia university say the FBI has found no violation of federal law in a data breach. Secretary of State Brian Kemp and Kennesaw State University this month confirmed that a federal investigation was focused on the school's Center for

and more »

data breach – Google News

Defining ‘acts of aggression’ in the age of cyber warfare – New York Post


New York Post

Defining 'acts of aggression' in the age of cyber warfare
New York Post
There is a consensus that aggression by one nation against another is a serious matter, but there is no comparable consensus about what constitutes aggression. Waging aggressive war was one charge against Nazi leaders at the 1946 Nuremberg …

and more »

cyber warfare – read more