It is in closed beta right now, but I have to admit that I am overly impressed with Newsvine. It has a lot of buzz in the tech circles and it appears to be warranted. For those in the beta, my promoted stories can be found at terrorism.newsvine.com. If you aren’t in the beta and […]
And a not so decent write-up or our BlackHat Federal presentation. A few misconceptions that don’t track with the point we were trying to get across. However, this quote says a lot about the problem space. I hope that this attracts some attention and gets Tom Parker some support for the models he is working […]
A decent write-up from my BlackHat presentation. “Obviously, nation-states have greater capacity to finance attacks,” Devost said. “We need to ask ourselves, ‘Who are the threats,’ because they all look the same in the exploit.” Effective risk management requires greater granularity in identifying our attackers, their motives and their capabilities, Devost said.
The flaw, which allows hackers to infect computers using programs maliciously inserted into seemingly innocuous image files, was first discovered last week. But the potential for damaging attacks increased dramatically at the weekend after a group of computer hackers published the source code they used to exploit it. Unlike most attacks, which require victims to […]