Also, Fake PornHub And Google Android Apps Are Actually ‘Russian Spy Tools’ First FaceApp, now a fake PornHub, and a fake Google Android App are being created and distributed as Russian tools and weapons, all forms of Information Warfare. This appears to be a trend, perhaps State sponsored, controlled or coordinated App Warfare? App Warfare,… Continue reading Russian defense contractor developing smartphone spyware: U.S. firm
Apple has disabled a major feature on the Apple Watch after learning it could be used to spy on iPhone owners. The Walkie-Talkie app – which has now been switched off – could remotely listen in to an iPhone through its microphone, Apple has warned. The Apple Watch Walkie-Talkie feature has been disabled for all… Continue reading Apple Watch feature that let owners SPY on other iPhones through microphone disabled to prevent snooping
Beside the obvious, that State eliminated this program and is now re-establishing it, the question is “why?” Yes, a position and a support staff is needed to coordinate efforts of monitoring and perhaps controlling dual-use cyber technologies and cyber weapons technologies, globally. The question would be, then, why was the position eliminated in the… Continue reading State Dept Plan for $20 million Cyberspace Security and Emerging Technologies Bureau
RT published a true story, Hillary Clinton to give keynote speech at cybersecurity summit (yes, really) I checked it out. Not only is it true but the FireEye Cyber Defense Summit webpage is highlighting that the former Presidential candidate is the keynote speaker. The Facebook response was hilarious. A few proposed titles for her speech: Proposed… Continue reading FireEye’s Cyber Defense Summit Is Laughingstock, Invites Hillary Clinton To Keynote
Tom McCuin / Apr 22, 2019 The Department of Justice released Special Counsel Robert Mueller’s final “Report On The Investigation Into Russian Interference In The 2016 Presidential Election” on Thursday. Predictably, it won’t be changing any minds. But it does reinforce one particular point that I’ve been making in this space for the last two years: Russia… Continue reading Russia: Adversary or Enemy? Depends on Your Definition of Cyber Attack.
The agenda for the eighth annual International Conference on Cyber Engagement has been released! REGISTER Tuesday, April 23, 2019 7:00 a.m. – 7:00 p.m. Lisner Auditorium US and foreign government workers and students attend for free! On the evening before the conference, The Hon. John Demers, Assistant Attorney General for National Security at the US Department of… Continue reading REGISTRATION OPEN: Eighth Annual International Conference on Cyber Engagement in Washington, DC on April 23, 2019
By Gunter Ollmann on April 09, 2019 While viruses and malware have stubbornly stayed as a top-10 “things I lose sleep over as a CISO,” the overall threat has been steadily declining for a decade. Unfortunately, WannaCry, NotPetya, and an entourage of related self-propagating ransomware abruptly propelled malware back up the list and highlighted the… Continue reading Get Ready for the First Wave of AI Malware