Zuckerberg admits Facebook mistakes amid Cambridge Analytica fallout

Facebook founder Mark Zuckerberg finally commented publicly on March 21 on his Facebook page about the Cambridge Analytica controversy, in which he admitted “mistakes” were made, and acknowledged his company’s “responsibility to protect your data,” and that a “breach of trust” occurred regarding that role. Zuckerberg pointed to a “breach of trust” between Cambridge University researcher Aleksandr Kogan (who developed a Facebook quiz app in 2013), Cambridge Analytica and Facebook. “I’ve been working to understand exactly what happened and how to…

Chelsea Manning accuser Lamo dies in Kansas

Adrian Lamo, the man who dropped a dime on Chelsea Manning, died this month in Kansas. The 36-year-old hacker, who had more recently lived as a drifter and who previously was convicted for hacking Microsoft and the New York Times, was approached by then U.S. Army Private Bradley Manning who ended up pilfering and leaking a…

Ten Ways Evolving Technology Affects Cybersecurity

1. Corporate Security Breaches The majority of these corporate security breaches occur when hackers exploit employees through social engineering and scams. With advancements in technology, hackers are becoming more skilled at finding holes and cracks in corporate security systems and can gain access to protected files and data, posing a significant cybersecurity threat. Unfortunately, 2012…

CYBER INSIDER RISK MITIGATION MATURITY MATRIX

Cyber security is increasingly recognised to be a people issue as much as a technical one. Boards now understand that their own employees may be the weak link in an organisation’s cyber defences. This article provides a self-assessment matrix to help organisations understand how effectively they are mitigating cyber insider risk and thus enable them…

WHO’S WATCHING YOU?

Over the last 10 years, we have witnessed massive changes in the embedded Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA), DCS and Physical Security (CCTV, access controls and alarms) sectors, with the adoption of IP-capable technologies through the Internet of Things (IoT) and now the Internet of Everything (IoE). However, the mindset…

3 Cybersecurity Threats SMB Etailers Should Not Ignore

Some small e-commerce website operators may think their relative obscurity offers protection, but the fact is that SMBs are especially vulnerable to cyberattacks and malware. “Very often small businesses don’t feel vulnerable to cyberthreats because they assume cybercriminals prefer to launch attacks on large companies,” said Stephanie Weagle, VP of Corero. “On the contrary, cybercriminals have…

What is Cyber Warfare?

Cyber Warfare Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another nation-state. In these types of attacks, nation-state actors attempt to disrupt the activities of organizations or nation-states, especially for strategic or military purposes and cyberespionage. Although cyberwarfare generally refers to cyberattacks perpetrated by one nation-state on another, it…

The cyber threat is growing

Many of today’s cyber criminals have their sights set on money. And they essentially take three approaches to achieving their goal. They conduct surveillance operations to systematically obtain valuable information from companies, they steal customer and credit-card data, and they blackmail companies by threatening to disrupt their business operations. Research results, for example, can be…