Cybersecurity · Privacy · Security

iRobot Wants to Sell Mapping Data Collected by Roomba Vacuums to a Tech Company Like Apple


There are three concerns at issue here. Privacy Security Profit One is not like the other two.  IRobot wants to sell your privacy and possibly your security for profit. </end editorial> Monday July 24, 2017 4:42 PM PDT by Juli Clover iRobot CEO Colin Angle today told Reuters that he hopes indoor mapping data collected by Roomba automatic vacuum… Continue reading iRobot Wants to Sell Mapping Data Collected by Roomba Vacuums to a Tech Company Like Apple

Cybersecurity · cyberwar · Information operations · Information Warfare

‘Keys to kingdom’ leaked by Sweden exposing military secrets and EU secure intranet


Names, photos and addresses of air force pilots, people under witness relocation, SEAL team operators and more were leaked. By India Ashok July 24, 2017 10:47 BST The STA’s leaked database remains under management of the two foreign firms, even as the Swedish government continues to investigate the scope of the leakiStock Sweden’s government has exposed sensitive… Continue reading ‘Keys to kingdom’ leaked by Sweden exposing military secrets and EU secure intranet

Information operations · Cybersecurity · cyberwar · Information Warfare

Briton admits to router hack that DDoSed Deutsche Telekom


‘It was unintentional’.   Talk about ready, shoot, aim.  The vast majority of cyber attacks are not approved because the carrier or the payload cannot be limited. This is a good example, if ‘Peter Parker’ aka ‘Spiderman’ is to be believed.  What I’m dying to know is how and why a Liberian ISP hired a… Continue reading Briton admits to router hack that DDoSed Deutsche Telekom

Cybersecurity · cyberwar · Information operations · Information Warfare

Accenture Security Report Identifies Top Cyber Threats of 2017


July 25, 2017 08:59 AM Eastern Daylight Time ARLINGTON, Va.–(BUSINESS WIRE)–With recent large-scale cyber attacks signaling a growing front in destructive threats and business impact, a new midyear report from iDefense, part of Accenture Security (NYSE:ACN), reveals how threat actors are continuing to evolve their ability to avoid detection. Based on in-depth analysis, the report… Continue reading Accenture Security Report Identifies Top Cyber Threats of 2017

Information operations · Cybersecurity

Adobe: Flash to EOL in 2020


EOL = End of Life End of life (EOL), in the context of manufacturing and product lifecycles, is the final stages of a product’s existence. </end editorial> Flash & The Future of Interactive Content Posted by Adobe Corporate Communications on July 25, 2017 Adobe has long played a leadership role in advancing interactivity and creative content –… Continue reading Adobe: Flash to EOL in 2020

Information operations · Cybersecurity · Russia · cyberwar · Information Warfare

Microsoft using lawsuits to thwart Putin’s hackers


BY JOE UCHILL – 07/21/17 01:01 PM EDT Microsoft lawyers have quietly been fighting back against the Russian hacking group that attacked the Democratic party last year, by taking it to court, according to a report in the Daily Beast. Beginning in August 2016, around six weeks after the cybersecurity firm Crowdstrike declared the group often called Fancy… Continue reading Microsoft using lawsuits to thwart Putin’s hackers

Cybersecurity · Information operations

Worst known governmental leak ever is slowly coming to light: Agency moved nation’s secret data to “The Cloud”


Sweden’s Transport Agency moved all of its data to “the cloud”, apparently unaware that there is no cloud, only somebody else’s computer. In doing so, it exposed and leaked every conceivable top secret database: fighter pilots, SEAL team operators, police suspects, people under witness relocation. Names, photos, and home addresses: the list is just getting… Continue reading Worst known governmental leak ever is slowly coming to light: Agency moved nation’s secret data to “The Cloud”