Tag Archive for: meets

Yahoo’s claim of ‘state-sponsored’ hackers meets with skepticism

Yahoo has blamed its massive data breach on a “state-sponsored actor.” But the company isn’t saying why it arrived at that conclusion. Nor has it provided any evidence.

The lingering questions are causing some security experts to wonder why Yahoo isn’t offering more details on a hack that stole account information from 500 million users.

“I think there’s a lot of fishiness going on here,” said Michael Lipinski, the chief security strategist at Securonix.

Yahoo didn’t respond to a request for comment. The company has protocols in place that can detect state-sponsored hacking into user accounts. In a December 2015 blog post, the company outlined its policy, saying it will warn users when this is suspected. 

To read this article in full or to leave a comment, please click here

Network World Security

Ransomware meets Linux – on the command line!

Here’s a Linux and Unix cryptographic toolkit especially for crooks. The encryption is free, but if Sir/Madam would like to decrypt Sir/Madam’s server, then Sir/Madam will have to pay.
Naked Security – Sophos

Sarah Palin meets the Streisand effect

Most of you are familiar with the term, but for those who are not, Wikipedia describes the Streisand effect thusly: “… the phenomenon whereby an attempt to hide, remove, or censor a piece of information has the unintended consequence of publicizing the information more widely, usually facilitated by the Internet.”

Want examples? There was this one I wrote about involving Circuit City and Mad Magazine. And another about a San Francisco TV station that got bamboozled after a plane crash.

To read this article in full or to leave a comment, please click here

Network World Paul McNamara

Real life HAL 9000 meets Skynet: AI controlled video surveillance society

Houston-based BRS Labs provides AISight software that offers the “first autonomous 24/7 behavioral analytics solution that analyzes video content, and alerts in real time on abnormal and suspicious activity.” To put it another way, computer-controlled video surveillance cameras are the eyes watching us and, via artificial intelligence, the Read more

Read more