Internet-tech, computer-tech, mobile-tech, energy-tech, eco-tech, green-tech, bio-tech, tech-tech, every day. That pretty much sums it up!
Tuesday, 16 September 2014
Your gadgets will never be secure — chase the hackers instead
Credit: Business Insider
It is fundamental to security that nothing is secure against a sufficiently determined & resourced attack. This applies to computer systems as well as physical security of premises & objects.
Mobile devices have their own peculiar own set of security risks. Smartphone manufacturers are under pressure to match the opposition. This means a shiny new phone with shiny new features, annually. There is not a substantial piece of software in existence without bugs. Some of these bugs are security related. Each new revision brings the risk of new bugs. Occasionally, even a bug-fix release will introduce a new bug.
Public WiFi networks represent a security risk peculiar to mobile devices.
http://www.bloomberg.com/news/2014-09-15/your-gadgets-will-never-be-secure-chase-the-hackers-instead.html
http://www.thewire.com/technology/2014/05/hacker-sabu-freed-from-prison/371649/
http://www.primagames.com/games/watch_dogs/tips/watch-dogs-multiplayer-how-catch-hacker / cyber-security all wrong Israel's intelligence unit patch each hole security experts focus finding puppet masters malware Nadav Zafrir military 8200 unit veterans Israel startup industry cyber defenders tools networks find traces hackers clues International Cybersecurity Conference Tel Aviv University Target hack exposed 40 million credit debit cards Home Depot damage defense pinpointing scripts malware people and the process behind the malware tenacity capacity resources malware have hack hacker hackign hacked game theory Keith Alexander U.S. National Security Agency company country solve hacker problem cyber security virus trojan worm script /
Subscribe to:
Posts (Atom)