![]() My task is to ensure that the folks at the hearing understand how prevalent breaches are, how broadly they’re distributed and the resultant impact on identity verification via knowledge-based authentication. Via: Security Architecture: Knowing the Adversary, a reason for DefCon December 21, 2017 Security conference held by Security corporations don’t hold a candle to walking amongst the hackers or wannabes. If you know neither the enemy nor yourself, you will succumb in every battle.” If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. “If you know the enemy and know yourself, you need not fear the result of a hundred battles. They claim “All it does is help those with criminal intent get an education”. In discussion with security people, they question why DefCon exist. Peterson said this as he was talking on the Jocko Podcast, specifically episode 98. “Unless you can think the way that an evil person thinks, then you’re defenseless against them, because they’ll go places you can’t imagine and then they win.” – Dr. There are a lot of maxims out there to “know thine enemy,” but here’s a good recent one that explains why: When I present or teach on a security topic, I take the time to cover the mindset of the adversary. Via: Enterprise Security Today April 13, 2018 Facebook will get fined, they will stop sharing info with anybody and this tech drama will be over. Now Facebook through a 3rd party shared friend contacts of publicly available information on only 87 million users who signed an EULA again Congress will just talk-the-talk. When Equifax just gave away 148 million social security numbers with matching information, which is truly meant to be private, Congress just talked-the-talk and never walked-the-walk. “The idea that we’re going to keep the wild, wild West - I don’t think it’s sustainable.” ![]() Mark Warner, a former tech executive who has led investigations into Russian interference on social media over the last year as the top Democrat on the Intelligence Committee. “It’s tricky and it’s going to be hard, but there are ways it can be dealt with,” says Virginia Sen. It’s a behemoth, with 2.1 billion monthly users, $40 billion in revenue and more than 25,000 employees worldwide.Īnd that leaves Washington with a daunting task: How do you tame a corporate giant? Or do you even try? July 7, 2019įacebook isn’t just a company. I will leave my email in the description below Geek’s email you and have a good one. I have a companion blog at were I ramble on about all things technical, stop by and visit me. I have a channel and personal goal is 500 subscribers by the end of the year, please be one of those subscribers. Show your support for this channel and these videos by subscribing to my channel, every subscriber I get, makes me smile just a little bit more. Upfront admission, not all Windows App’s run on Linux but there may be an alternative. If there is some application you use in Windows and want to see running on Linux drop me a comment or a message. I try to respond to any and all comments. Leave me a comment with suggestions, requests or even criticisms. ![]() If you were entertained a bit, learned something or laughed just a little, press that ‘like’ button. If you use cloud storage then I highly recommend Cryptomator.Ġ0:58 Peppermint 10 Installation and Startup Ġ1:26 Peppermint 10 Experiment Dropbox install There is some minor slow down in performance but, this is the price we pay for security. ![]() Cryptomator encrypts the files on your desktop before it moves them over the Internet to the cloud storage provider. Crypotmator is available on Windows, Linux, MacOS, Android and iPhone. It took the son a week to figure out it was an outside attack.Ĭonsider avoiding “Hosting Services” if possible.Ĭryptomator is a donationware application to provide encryption services for your cloud storage from Dropbox, Google Drive and Network Attached Storage. My oldest son argued with me about his Nest Thermostat was secure, so with a little help from one of my grey hat friends we hacked his thermostat and set the heat to 80 degrees. This includes your doorbell and Thermostat. I have been telling folks that the Internet of Things (IoT) devices that use a “Hosting Service” to allow you to use them also allow others you may not want to be using them. This raises the question: do you really need Ring, or have Amazon and the police misled you into thinking that you do? It turns what seems like a perfectly safe neighborhood into a source of anxiety and fear. By sending photos and alerts every time the camera detects motion or someone rings the doorbell, the app can create an illusion of a household under siege. Doors across the United States are now fitted with Amazon’s Ring, a combination doorbell-security camera that records and transmits video straight to users’ phones, to Amazon’s cloud-and often to the local police department.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |