Cybersecurity & Espionage Articles
Original article ZDNet.com
Geoblocking, the practice of websites blocking users from certain countries from accessing their content, is not as widespread as most people believe, a recently published study has revealed. Scans of the Alexa Top 10,000 and Top 1 Million sites have unveiled low percentages of websites engaging in geoblocking. More precisely, researchers found that only 596 websites from the Alexa Top 10,000 list of sites engaged in geoblocking (also known as geofencing), and only 1,595 sites did so from the Alexa Top 1 Million.
0 Comments
Original article at TheAtlantic.com
But the link Brooks sent wasn’t to iconosquare.com—it was to lconosquare.biz, a cloned version of the site set up for phishing. Once the influencer logged in with the Instagram username and password, Brooks seized control of the account. Within minutes, he was spamming the influencer’s millions of followers with offers for a free iPhone. Original Document
The insider threat is a dynamic problem set, requiring resilient and adaptable programs to address an evolving threat landscape, advances in technology, and organizational change. The effort requires continual evaluation and updated perspectives and approaches. In furtherance of this effort, the NITTF has developed, in collaboration with executive branch D/As, an InTP Maturity Framework (hereafter referred to as “Framework”) to enhance the Minimum Standards. The Framework identifies key elements within the Minimum Standards construct to enable D/As to increase the effectiveness of program functionality, garner greater benefit from InTP resources, procedures, and processes, and tightly integrate InTP procedures and objectives with their distinct missions and challenges. The Framework consists of 19 elements aligned with the existing Minimum Standards topic areas. Each maturity element (ME) identifies a capability or attribute of an advanced InTP and provides amplifying information to assist programs in strengthening the effectiveness of the associated minimum standard. When using this Framework, InTPs should employ risk management principles tailored to meet the needs of their distinct workplace environment, technology infrastructure, and agency mission. InTPs also need to ensure compliance with their D/As’ policies and regulations and all applicable legal, privacy and civil liberties rights, and whistleblower protections when evaluating and incorporating Framework elements into their programs. Senior Official/InTP Leadership
Original article at ZDNet.com
Research White Paper at DarkTrace.com Artificial intelligence has the potential to bring a select set of advanced techniques to the table when it comes to cyber offense, researchers say. However, for each sophisticated attack currently in use, there is the potential for further development through the future use of AI. Within the report, the cybersecurity firm documented three active threats in the wild which have been detected within the past 12 months. Analysis of these attacks -- and a little imagination -- has led the team to create scenarios using AI which could one day become reality. Original article at Wired.com
As websites and web apps have grown in complexity, so have their demands: They want access to your webcam to make video calls, they want to know where in the world you are to serve up local information, and so on. In fact, websites now ask for almost as many permissions as the apps on your phone do, though you might not be as familiar with how to manage them. We'll show you how. We'll also explain how to restrict the cookies and other data websites can save locally on your laptop. It's up to you whether you let sites track your identity across the web to better personalize the ads you see, but you should know the options that are available. Original article at CIA.gov
|
Cyber-CyI find interesting articles on the web that are simple, down-to-earth, easy to understand, and (hopefully) informative for non-technical readers. Archives
November 2022
Categories |