Tag: Hacking
Where Eagles Dare
by Giacomo Pastorella on August 3, 2018 3:32 pm
Automation is starting to impact more and more fields of expertise were humans were considered to be essential: driving cars, working in a factory, serving food and, lately, the art of killing one another. As the era of mass warfare came to an end, the population of western countries became increasingly unsupportive with the idea… Read more Where Eagles Dare
Artificial Intelligence and Cloud Computing in Defence Systems
by Dev Saraf on August 1, 2018 9:50 am
“An unmanned systems future, really for almost every facet of our life, is inevitable. It is not going away, so we need to deal with it head-on” says Brigadier General Frank Kelley, and I concur. Kelley, the Deputy Assistant Secretary of the Navy’s unmanned systems put forward his idea that the unmanned drones are on… Read more Artificial Intelligence and Cloud Computing in Defence Systems
Hacking: For Money or Change
by Sharon Chen on July 27, 2018 1:12 pm
A few years back, I became slightly obsessed with the show Black Mirror. One of it’s episodes, “Shut Up and Dance,” thoroughly freaked me out and got me paranoid about whether hackers could see what I was doing on my laptop screen or see my face while I was on my laptop (I covered up… Read more Hacking: For Money or Change
How the Largest Employer in the U.S. Fares on Cybersecurity
by Young Wu on July 25, 2018 5:34 pm
When it comes to cybersecurity, large organizations have to be vigilant to prevent a single hack or intrusion from turning into a disaster. As we heard in class last week, high-profile hacks of notable companies have led to significant consequences. The hackers who compromised Target’s databases in 2013 gained access to 40 million credit card… Read more How the Largest Employer in the U.S. Fares on Cybersecurity
Cyber Security
by Dev Saraf on July 24, 2018 11:48 am
Cyber threat refers to a person who attempts to gain access into a computer system or information without proper authorisation by the use of a data communication pathway. Cyber threats are no unknown devil in the 21st century, private information being shared and leaked around the world is now normal, armies of countries and companies… Read more Cyber Security
Hic Sunt Dracones
by Giacomo Pastorella on July 19, 2018 4:32 pm
The Space Race started with an early lead by the Soviet Union, which managed to reach a stable orbit with the first ever artificial satellite, the Sputnik 1. This impressive achievement started the so-called “Sputnik Crisis” in the United States, as the West feared that the USSR had surpassed it in space-related technologies, which had obvious… Read more Hic Sunt Dracones
Spear Phishing
by Chris Sinclair on July 28, 2017 8:45 pm
PHISHING EMAILS. We’ve all had them. “Enter your bank details at *insert link here* for a tax rebate/PPI claim/windfall from your long lost great-great-uncle’s savings. We are become more and more aware of these attempts to rob us, especially now that millenials, who are wiser to these threats, are starting to become so prevalent in… Read more Spear Phishing
Why is Cybersecurity so hard?
by Saran Singh Sound on July 28, 2017 11:07 am
The first six months of 2017 has already seen an inordinate number of cybersecurity meltdowns. And they weren’t just your standard corporate breaches. It’s only July, and already there’s been viral, state-sponsored ransomware, leaks of spy tools from US intelligence agencies, and full-on campaign hacking. And that’s just the beginning. Cybersecurity is the body of… Read more Why is Cybersecurity so hard?
Where is the Line Between Cybercrime and Cyberwar?
by Ben Garlick on July 28, 2017 10:42 am
On April 27, 2007, Estonia began relocating the “Bronze Soldier of Tallin”, a Soviet-era monument commemorating Soviet soldiers killed while liberating Tallin from Nazi occupation, from its original location to an Estonian military cemetery. The Russian government strongly condemned plans for moving the statue. Beginning that same day, Estonia experienced a widespread and coordinated cyberattack… Read more Where is the Line Between Cybercrime and Cyberwar?
Precious Loot: Healthcare Data
by Samuel Piotr Emch on July 28, 2017 10:25 am
In February 2015, the US health insurance Anthem Blue Cross announced the biggest data breach in the healthcare sector, even to this day. [1] Almost 80 million company records had been stolen. The hackers gained access to highly sensitive data like Social Security Numbers, birthdates and addresses. The Anthem case represents the tenacity that hackers… Read more Precious Loot: Healthcare Data