csrollyson + cyber   27

U.S. 2018 elections 'under attack' by Russia: U.S. intelligence chief
Easy prediction: Why wouldn’t #Russia use a core #competency when it’s increasing effective? #Election #meddling
prediction  Speculation  russia  usa  election  Q1  2018  midterm  trump  cyber  war  fbi  intelligence  comparison  germany 
february 2018 by csrollyson
How One Woman's Digital Life Was Weaponized Against Her | WIRED
Amazing story of cyber harassment, a love triangle gone bad, and dangers of Internet affairs
cyber  bully  sext  case  washington  marriage  arizona  fbi  trial  mediation  privacy  forensics  tor  hack  harassment 
november 2017 by csrollyson
Russia's Cyberwar on Ukraine Is a Blueprint For What's to Come | WIRED
MUSTread: Cyberspace is not a target, it's a medium to attack critical infrastructure of whole countries
cyber  war  russia  ukraine  usa  story  example  2017  Q2  hack  power  electric  grid  election  attack  security  military  malware  howto  railroad  alabama  Sandworm  poland  government  pension  defense  crashoverride  utility 
october 2017 by csrollyson
Russia just used Trump’s favorite social network to hack the US government | ZeroFOX
How #Russia tries to make #democracy a liability: #Socialmedia #malware attack on USA DoD
social  media  news  russia  usa  defense  department  government  2017  Q2  attack  cyber  crime  war  employee  howto  example  malware  phishing  spear  bot  2ghcj 
may 2017 by csrollyson
Hackers Came, but the French Were Prepared - The New York Times
How the Macron campaign fought off the #russia election #cyber #attack
france  election  attack  hack  russia  putin  analysis  q2  2017  cyber  macron  phishing  computer  politics  security 
may 2017 by csrollyson
cyberwar | Britannica.com
Useful: compares cyber war, espionnage, terror, crime
cyber  war  espionnage  terrorism  crime  comparison  reference  defense  law  international  government 
march 2017 by csrollyson
Cyber Terrorism - How Real is the Threat?
Broad introduction to #cyber #war and civilian targets #IoT a major threat
cyber  war  civilian  IoT  target  q2  2016  security  terrorism 
march 2017 by csrollyson
Wired - October 2016 by min-mag.com - issuu
@Google #jigsaw: Tries to protect people against cyber bullying [but nuance is everything, machines need work]
google  digital  twitter  bully  politics  thug  russia  intimidation  internet  cyber  jigsaw  privacy  security 
january 2017 by csrollyson
Waves of cyber attacks hit Netflix, Spotify, Twitter
Hackers released super-simple code to enable #botnet attacks in early October
ddos  cyber  attack  2016  q4  twitter  amazon  netflix  internet  botnet  hack  2ghcj  2snr 
october 2016 by csrollyson
Are You and Your Company Ready for a Cyber World War? | DigitalNext - AdAge
USEFUL scenario for your own cyber disaster plan: Use it to increase your flexibility #kudos
cyber  attack  plan  2016  Q4  Newyorkcity  scenario  bank  computer  power  internet  cloud  wifi  2012  example  credit  card  market  stock  2cdo  2csra  2execguide  2egfb  2egtw  2snr  2sbs  cco 
october 2016 by csrollyson
Flash From The Past: LinkedIn Hacked | ZeroFOX
PSA: the new #LinkedIn #hack, what you need to know (plz share) #security
linkedin  Q2  2016  hack  security  dark  web  history  2012  password  login  howto  cyber  crime  2execguide  facebook  social  network 
may 2016 by csrollyson
Cyber Monday is the Buggy Whip of E-Tailing. - TurkelTalks | TurkelTalks
[commented] Declining results for "#cybermonday": Why mega retail sales indicate the end of "traditional" #retail
retail  q4  2014  cyber  monday  pointofview  csrblogcomment  consumer  promotion  results  economy  brand  marketing  sochap  usa  disruption  luxury 
december 2014 by csrollyson
What the Elizabethans Teach us About Cyber-Security - The Analogies Project
Fascinating example of secret messaging and espionage + parallels to cyber security & hacking #Kudos #fb
history  security  england  example  elizabeth  mary  scotland  france  spain  espionage  spy  agent  message  plot  treason  cyber  diligence  training  tudor  government  exceptional 
september 2014 by csrollyson
6 Ways Health Care Providers Can Reduce Medical Device Security Risks - Deloitte CIO - WSJ
Malware & security risks in #healthcare smart networked devices #IoT - How-to post recommends security strategies #fb
IoT  healthcare  smart  device  malware  hack  security  medicine  ubiquitous  computing  network  cyber  hospital  clinic  howto  deloitte  collaboration  digital  CDO  control  procurement  2cdo  2csra 
february 2014 by csrollyson
Obama Ordered Wave of Cyberattacks Against Iran - NYTimes.com
Exposé of USA/Israel cyberwar against Iran's nuclear material enrichment program at Natanz
usa  obama  iran  nuclear  stuxnet  malware  exposé  Israel  natanz  SAP  centrifuge  Bush  CIA  cyber  war  sabotage  2006  2008  2010  2ghcj 
june 2012 by csrollyson
Special report: Government in cyber fight but can
Sobering recap of USA cyber war challenges, capabilities: a new trend
q2  2011  cyber  war  usa  russia  israel  hack  software  malware  contractor  partner  2ghcj 
june 2011 by csrollyson

related tags

2cdo  2csra  2egfb  2egtw  2execguide  2ghcj  2sbs  2snr  12lc1  activism  adoption  africa  agency  agent  alabama  amazon  analysis  arizona  artificial  attack  authoritarian  bank  bitcoin  bot  botnet  brand  buddypress  bully  Bush  california  canada  capitalism  card  case  casestudy  cco  CDO  censorship  centrifuge  children  china  CIA  civil  civilian  clinic  cloud  club  collaboration  community  comparison  computer  computing  consumer  contractor  contro  control  crashoverride  credit  crime  csrblogcomment  currency  cyber  dark  ddos  defense  deloitte  department  developer  device  digital  diligence  disparity  disruption  economy  election  electric  elizabeth  employee  encryption  england  enterprise  espionage  espionnage  europe  example  exceptional  exchange  exploit  exposé  facebook  fbi  forensics  france  germany  global  google  government  grid  growth  hack  harassment  healthcare  hightech  history  hospital  howto  industry  intelligence  international  internet  intimidation  investor  IoT  iran  israel  jigsaw  korea  law  learning  liberty  linkedin  login  luxury  machine  macron  malware  market  marketing  marriage  mary  media  mediation  medicine  message  midterm  military  monday  natanz  netflix  network  news  Newyorkcity  ngo  north  nuclear  obama  online  outage  partner  password  pension  phishing  plan  platform  plot  pointofview  poland  police  policy  politics  power  prc  prediction  printer  privacy  procurement  promotion  putin  Q1  q2  q3  q4  railroad  reference  regime  report  reputation  results  retail  russia  sabotage  Sandworm  SAP  scenario  scotland  security  sext  siemens  smart  smartphone  snowden  sochap  social  software  south  spain  spear  Speculation  spy  stock  story  stuxnet  surveillance  syria  target  technology  terrorism  threat  thug  tor  training  treason  trial  trump  tudor  twitter  ubiquitous  uk  ukraine  usa  utility  value  vendor  war  washington  wealth  weapons  web  whistleblower  wifi  wordpress 

Copy this bookmark:



description:


tags: