Skip to main content

Home/ The Order of the Spork/ Group items tagged hacks

Rss Feed Group items tagged

Iam me

Your Gmail Hacking Finale: Official Advice from Google - James Fallows - Technology - T... - 0 views

  •  
    What to do if your gmail account gets hacked and tips for avoiding getting hacked in the first place. 
Raq Winchester

A 'Spooks And Suits' Red Team Game - Dark Reading - 0 views

  •  
    A 'Spooks And Suits' Red Team Game Social media apps meet national security Jul 20, 2011 | 12:40 PM | 0 Comments By Kelly Jackson Higgins Dark Reading What if a former Navy SEAL petty officer were a member of Anonymous? Senior members of the U.S. intelligence agency, including Michael Chertoff, the former Secretary of Homeland Security, and a former SEAL officer, will participate in a red-team exercise in September where they'll play the role of Anonymous/LulzSec and APT attackers, as well as the defenders trying to fend off these adversaries. Sure, simulated cyberattack games are nothing new these days. But this one is part and parcel of the upcoming Spooks and Suits summit in Silicon Valley on Sept. 23 and 24, and it throws together intell officials and attendees. It's the brainchild of cybersecurity expert Jeffrey Carr, who wanted to bring together three-letter agencies, like the CIA, NSA, and DoD, with social media and Web 2.0 developers and start-ups to actually communicate one-on-one with each another and with general attendees. It works like this: Attendees will be randomly assigned to one of four teams of 25 to 30 people: Anarchist hackers (a la Anonymous and LulzSec), APT attackers, or one of two defending organizations. The teams then must observe all of the panel discussions -- which will cover threats against the intell community, as well as demonstrations of new and existing social media applications -- from the perspective of either adversary or defender, depending on which team they are assigned. "If one of the apps presented has to do with a game, the objective for the attendee is to say, 'How can I use that game as an adversary? Or how can I use it to uncover or defend against an adversary?'" says Carr, who is the founder and CEO of Taia Global, an executive cybersecurity firm, and author of "Inside Cyber Warfare." "During breaks, they can play with the apps with an eye to their mission." The teams will have a working lunch period for buildi
Adam Roades

U.S. Government Slips Through China Internet Censors With New Technology - FoxNews.com - 0 views

  •  
    Great news for folks in China, but now that we've publicized how we plan to circumvent the country's censorship technology, can a countermeasure be far behind?
Iam me

Clay Shirky Says Good Collaboration is Structured Fighting - 0 views

  •  
    Here Shirky started talking about the importance of managing collaboration effectively. Large collaborative projects aren't, in fact, large collaborative projects according to Shirky. They're small collaborative projects with tight groups, that integrate very large amounts of small participatory effort. To put it another way, projects like Wikipedia and the Linux kernel may have thousands of contributors - but it's a small core of contributors who do the bulk of the work and integrate the work from others who only contribute a small amount. It's also important, says Shirky, that people cannot join the project too easily. Even given the presumption that all the participants have goodwill towards the project, he says that it shouldn't be too easy to change every aspect of a project. Some parts of the system should be easy to change, some parts should be hard.
Iam me

IBM Open-Sources Potential "Internet of Things" Protocol - 0 views

  •  
    IBM announced it is joining with Italy-based hardware architecture firm Eurotech in donating a complete draft protocol for asynchronous inter-device communication to the Eclipse Foundation. It is being called Message Queuing Telemetry Transport (MQTT) protocol, the machine-to-machine counterpart of HTT
1 - 14 of 14
Showing 20 items per page