Monday, March 02, 2020

What I Am Reading 3/2/2020 - Hackers, Porn and Slavery

Books

Network Forensics Tracking Hackers Through Cyberspace

The Ten-Day MBA 4th Ed.: A Step-By-Step Guide To Mastering The Skills Taught In America's Top Business Schools

Wired for War: The Robotics Revolution and Conflict in the 21st Century


Blogs / News

Given the low cost, high impact of cyber operations, Iran has become a prominent actor in cyber space. They are responsible for some of the largest nation-state level attacks in the last 10 years.Iranian hacking started small, defacing websites and bulletin boards and propaganda .
Following 2009 internal strife, the Government of Iran created its first internal cybersecurity organization, Gerdab.ir. According to RecordedFuture.com, “Gerdab.ir emerged as the IRGC’s domestic hacking group tasked with targeting opposition news websites and individuals considered immoral by the regime”. Following the Stuxnet attack in 2010, Iran increased their cyber capabilities, creating the Iranian Cyber Army. Since 2011, the ICA has been accused of attacks on the US, Saudi Arabia, and Turkey.
 Wired - How a Hacker's Mom Broke Into a Prison—and the Warden's Computer -
To help get her in the door, Black Hills made Rita a fake badge, a business card, and a "manager's" card with John's contact info on it. Assuming she got inside, she would then take photos of the facility's access points and physical security features. Rather than have her try to hack any computers herself, John equipped Rita with so-called Rubber Duckies, malicious USB sticks that she would plug into every device she could. The thumb drives would beacon back to her Black Hills colleagues and give them access to the prison's systems. Then they could work on the digital side of the pen test remotely, while Rita continued her rampage.
 Hot Air - Fauci: That NYT article was “completely misconstrued”, he’s not muzzled -
In his capacity as the head of the National Institute of Allergy and Infectious Diseases, Fauci is the perfect point person on COVID-19 updates. He is 79 years old, not prone to dramatic statements, and he is very professional in his public demeanor. In other words, he has been around and knows when to panic and when not to panic. This isn’t the time to panic, according to the information available to him. He specifically made a point to calm nerves and state to the White House press during President Trump’s press conference Saturday that most people will not be required to be hospitalized if they contact COVID-19. The symptoms will be such that otherwise healthy people can stay home and treat the symptoms like they would the flu or a bad cold. He said there are occasional outliers who may die from the disease, like a normally healthy young person, but those cases are very rare. The patients who will be hit hardest and may require hospitalization are the elderly and those with compromised immune systems.
Sydney Morning Herald -  Nike, Apple among dozens of major brands implicated in report on forced labour -
Nike, Apple and a major manufacturer building trains in Australia are among the dozens of global brands implicated in a new report on forced labour in China, amid growing international concern over the treatment of the Uighur people.
AP -  Navy to overhaul its education system as US advantages erode -
The Navy wants to create a naval community college to provide associate’s degrees to tens of thousands of young sailors and Marines, at no cost to them. It plans to unify the schools within the existing naval university system, similar to a state university system, and invest in them, as well as enact new policies to encourage and reward those who pursue professional military and civilian education.
“In a world where potential adversaries are peers economically and technologically, how do you win?” Kroger said in an interview. “We think we can out-fight potential opponents because we can out-think them. In order to do that, we must have, by far, the best military education program in the world.”
Yahoo - Apple CEO Tim Cook said the Trump administration directly intervened to help the iPhone maker break into India -
"I see India as a huge opportunity for us, for years we could not enter there unless we entered there with a partner [...] and we did not want to do that, we wanted to maintain control of our brand and so forth," he said.
Apple will no longer have to find a partner as, according to Cook, the Trump administration lobbied on Apple's behalf.
"The administration worked on this with the Indian government and that change has been made," he said.
CNBC - Jack Welch, former chairman and CEO of GE, dies at 84 -
“Mr. Welch was a white-collar revolutionary, bent throughout his career at G.E. on championing radical change and smashing the complacency of the established order,” the editorial said. “His legacy is not only a changed G.E., but a changed American corporate ethos, one that prizes nimbleness, speed and regeneration over older ideals like stability, loyalty and permanence.”

 Buzzfeed - Terabytes Of Stolen Adult Content From OnlyFans Have Leaked -
A leak of several terabytes of pornographic images and videos from clip site OnlyFans went viral on Thursday. According to users on Twitter, versions of the leak — being shared via the Mega cloud storage site — contain between 1.5 and 4 terabytes of content.
OnlyFans is a British social media platform popular with influencers, porn actors, and sex workers. It allows users to host images and video content behind a paywall for subscribers.
HelpNet Security - 5 considerations for building a zero trust IT environment -
Zero trust frameworks certainly include many technologies that are already widely used by organizations to protect their data. However, zero trust represents a clear pivot in how to think about cybersecurity defense. Rather than defending only a single, enterprise-wide perimeter, this approach moves this perimeter to every network, system, user, and devices within and outside the organization. This movement is enabled by strong identities, multi-factor authentication, trusted endpoints, network segmentation, access controls, and user attribution to compartmentalize and regulate access to sensitive data and systems.



No comments: