Tag Archive for: storm

Area students win in BVU computer security contest – The Storm Lake Times

Area students win in BVU computer security contest
The Storm Lake Times
Students from the Buena Vista University computer science department competed against each other and students from three additional schools during BVU's fourth annual virtual Capture the Flag computer security contest on Saturday, April 16.

and more »

“computer security” – read more

More protection needed to guard grid from electromagnetic storm threat

The United States isn’t as deeply unprepared for electromagnetic threats – either from space or man-made — as it was a few years ago but a lot of work remains and awareness of the danger needs to be amped-up if the country wants to truly protect the electric grid.

That was the general conclusion from a report by the watchdogs at the Government Accountability Office this that looked at federal efforts to address electromagnetic risks to the electric grid.

+More on Network World: Threat or menace?: Gaging electromagnetic risks to the electric grid+

To read this article in full or to leave a comment, please click here

Network World Security

Oculus Rift sparks Ts and Cs storm over sharing data with Facebook

Oculus Rift users can expect to share their “physical movements and dimensions when [using] a virtual reality headset” with Facebook and pals.
Naked Security – Sophos

Pawn Storm cyberespionage group increases activity, targets NATO

Even though its activities were exposed last year, a cyberespionage group dubbed Pawn Storm has ramped up its efforts over the past few months, targeting NATO members and potentially the White House.

The first quarter of this year “has seen a great deal of activity from the group,” researchers from antivirus firm Trend Micro said Thursday in a blog post. “Most notably this involved setting up dozens of exploit URLs and a dozen new command-and-control (C&C) servers targeting NATO members and governments in Europe, Asia and the Middle East.”

To read this article in full or to leave a comment, please click here

Network World Security