cyber security

TheDigitalArtist/Pixabay

When a country uses a bomb, the world knows.  When a country uses cyber warfare instead... well, our intelligence services say Russia did, and Vladimir Putin says it did not. 

That's one of the major differences in an age that allows warfare through computers.  It's no accident that security correspondent David E. Sanger calls his new book The Perfect Weapon

It's subtitled War, Sabotage and Fear in the Cyber Age.  No soldiers need apply; hackers step forward. 

Wikimedia Commons

Before you click on that cute GIF of the fuzzy kitten, you might want to hear a few words from Mike Ahmadi. 

He is well acquainted with the baits and lures used by hackers to get people to surrender critical information over the web, sometimes real money. 

Southern Oregon University was recently victimized in a scam that resulted in nearly $2 Million dollars being wired to a fraudster by mistake. 

Mike Ahmadi sees such activity all the time in his job helping big companies protect their computers and all the information they hold. 

Being The Bad Guys On Purpose: "Red Team"

Dec 9, 2015
Basic Books

There comes a point in just about every organization when someone asks of a plan: "is it bulletproof?" 

And rather than find out the hard way, many organizations, public and private, set up a "red team" to act like an adversary and test the capabilities of a plan or product. 

We get a look inside the process of choosing and running a Red Team from the book of that name by security expert Micah Zenko. 

He traces the practice back to the Catholic church of centuries ago, and shows how such teams can provide an effective hedge against trouble. 

Oregon Senator Ron Wyden continues to celebrate the passage of the USA Freedom Act, but says there's more to do.

The federal government's power to collect phone call data and hold it expired at the end of May. 

Congress had to scramble to pass a new program, but it does not restore the power to hold the data, phone companies will hold it instead. 

Wyden worked for a long time to stop the federal collection.  And he says the efforts to find the balance between security and privacy do not end there.

Catching The Catfishers

Jul 16, 2014
Career Press

Not everybody relishes the wild-west nature of the Internet. 

Sure, it's fun to see old friends on Facebook, but how much information on you is being collected?  Short answer: a lot. 

Tyler Cohen Wood works for the Department of Defense on cyber-security and social media issues.