Skip to main content

Home/ The Order of the Spork/ Group items tagged security

Rss Feed Group items tagged

Raq Winchester

A 'Spooks And Suits' Red Team Game - Dark Reading - 0 views

  •  
    A 'Spooks And Suits' Red Team Game Social media apps meet national security Jul 20, 2011 | 12:40 PM | 0 Comments By Kelly Jackson Higgins Dark Reading What if a former Navy SEAL petty officer were a member of Anonymous? Senior members of the U.S. intelligence agency, including Michael Chertoff, the former Secretary of Homeland Security, and a former SEAL officer, will participate in a red-team exercise in September where they'll play the role of Anonymous/LulzSec and APT attackers, as well as the defenders trying to fend off these adversaries. Sure, simulated cyberattack games are nothing new these days. But this one is part and parcel of the upcoming Spooks and Suits summit in Silicon Valley on Sept. 23 and 24, and it throws together intell officials and attendees. It's the brainchild of cybersecurity expert Jeffrey Carr, who wanted to bring together three-letter agencies, like the CIA, NSA, and DoD, with social media and Web 2.0 developers and start-ups to actually communicate one-on-one with each another and with general attendees. It works like this: Attendees will be randomly assigned to one of four teams of 25 to 30 people: Anarchist hackers (a la Anonymous and LulzSec), APT attackers, or one of two defending organizations. The teams then must observe all of the panel discussions -- which will cover threats against the intell community, as well as demonstrations of new and existing social media applications -- from the perspective of either adversary or defender, depending on which team they are assigned. "If one of the apps presented has to do with a game, the objective for the attendee is to say, 'How can I use that game as an adversary? Or how can I use it to uncover or defend against an adversary?'" says Carr, who is the founder and CEO of Taia Global, an executive cybersecurity firm, and author of "Inside Cyber Warfare." "During breaks, they can play with the apps with an eye to their mission." The teams will have a working lunch period for buildi
Iam me

Skype Update for Android Fixes Security Flaw, Adds 3G Calling | Gadget Lab | Wired.com - 0 views

  •  
    Skype adds 3G calling on all US networks as it fixes security flaw. 
Iam me

Why mobile data encryption doesn't matter (as much) | VentureBeat - 0 views

  •  
    encryption, as a preventive measure, assumes the primary threat is coming from the "outside" - typically (but not exclusively), in the form of a hacker trying to intercept communications or extract data from a lost or stolen device. While such threats are real and you absolutely must guard against them, we've reached a crucial point in the evolution of mobile technology, and just as importantly, user behavior where the primary mobile security threat is no longer the faceless and malicious hacker, but instead the legitimate, fully authenticated owner of the device itself.
Iam me

Google Betters Android Security, Management for Honeycomb Tablets - Mobile and Wireless... - 0 views

  •  
    New tools from Google help integrate Android 2.2+ smartphones into corporate intranets. 
Iam me

Privacy, Security & Your Dropbox - 0 views

  •  
    Dropbox explains changes to their Terms of Service and their various policies and approaches to protecting user data
Adam Roades

Dover Air Base mortuary supervisor resigns - The Washington Post - 0 views

  • division director
    • Adam Roades
       
      check this out
Raq Winchester

21st Century Threat Appraisal Part1 - 0 views

  •  
    SF author and SIGMA member David Brin's rather ugly slide deck
Iam me

Twitter Blog: Mission: Permission - 0 views

  •  
    All third-party applications that you allow to access your Twitter account go through a permissions process. Today we're announcing an update to help you make more informed choices about the way third-party apps integrate with your Twitter account:
Iam me

Cheap GPUs are rendering strong passwords useless | ZDNet - 1 views

  •  
    "Throw in a nine-character, mixed-case random password, and while a CPU would take a mind-numbing 43 years to crack this, the GPU would be done in 48 days."
1 - 20 of 28 Next ›
Showing 20 items per page