14 Aug 2012

How computation can predict group conflict

“When conflict breaks out in social groups, individuals make strategic decisions about how to behave based on their understanding of alliances and feuds in the group.” Source: How computation can predict group conflict: Fighting among captive pigtailed macaques provides clues

Read More
dod-cyber
06 Aug 2012

Questioning the Offense-Defense Balance in Cyberspace

Analysts, policymakers, and defenders often paint a bleak picture of the cybersecurity landscape. The Internet was built for resiliency, convenience, and openness, not security, and barriers to entry are low, meaning that criminals, foreign intelligence, activists, and states have many opportunities to launch countless attacks, especially if they are automated.

Read More
FBI-JTTF
12 Jul 2012

Cyber security in the Emergency Services Sector

This article discusses some ongoing programs in the Emergency Services Sector (ESS) that can help your agency to identify its cyber footing.     . Protecting and ensuring the continuity and resilience of the critical infrastructure and key resources (CIKR) of the United States are essential to the Nation’s security, public

Read More
insider
29 Jun 2012

The Threat From Bad Malware Analysis

The leak that the U.S. was apparently behind the Stuxnet worm that impacted the Nataz nuclear enrichment facility in Iran came – as it always does – with a rash of analysis and opinion related to the hazards associated with “sophisticated” malware and “cyber weapons.” But it is a reliance

Read More
insiderdetect
29 Jun 2012

US Government Agency Insider Threat Planning

Federal Cyber Security professionals have long considered the “insider threat” as the most insidious, hardest to protect against threat vector. This has always been the toughest form of threat, even before computers were created. Now that every employee in the entire organization must have access to IT the cyber version

Read More
27 Jun 2012

App offers safety in a riot

Interesting application of crowd sourced data drawn from social media streams and geolocation data. “A smartphone application, enabling people in the middle of riots to find safety, has been shown off at the TEDGlobal event in Edinburgh. The app has been developed by Salvatore Iaconesi, a newly created TED Fellow.

Read More
13 Apr 2012

Fourth sea cable linking East Africa goes live 

“The fourth undersea linking East Africa to the rest of the world – Lower Indian Ocean Network submarine cable (LION2) has gone live, offering another redundancy route (an alternative option) to Internet service operators. “ Source: Fourth sea cable linking East Africa goes live – Corporate News |businessdailyafrica.com

Read More
05 Apr 2012

11 arrested over suspected leak of cutting-edge display technology

“Eleven people were arrested on suspicion of leaking key technology involved in making next-generation flat screen displays, police said Thursday.    The suspects allegedly transferred the technology from flat screen display maker Samsung Mobile Display (SMD) to a local rival firm, using their past or current ties to either company,

Read More
04 Apr 2012

US fears al Qaeda cyber attack on New York

“US law enforcement and counterterrorism officials are trying to figure out the significance of recent occurrences on websites believed to have close links to al Qaeda, including a graphic some fear could be an attack threat directed at New York City.” Source: US fears al Qaeda cyber attack on New

Read More