Patexia Interest Groups

Cyber Security > Summary

Cyber security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The term computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The strategies and methodologies of computer security often differ from most other computer technologies because of its somewhat elusive objective of preventing unwanted computer behavior instead of enabling wanted computer behavior.

Description courtesy of Wikipedia. Photo: System Code by Yuri Samoilov available under CC BY 3.0.

FBI moves to expand computer search powers, complicating Microsoft’s push to protect overseas cloud customers — Tech News and Analysis Search warrants issued by an ... Read More »
​New NSA director to Silicon Valley: We come in peace - CNET Nevermind the surveillance spat between the US government and the tech titans of Silicon Valley: NSA... Read More »
New Apple-focused malware uses Macs to infect iPhones - CNET A new kind of malicious software strikes at Mac OS X and iPhone users in China, according to a just-released ... Read More »
Here's a bad sign for CurrentC, the fledgling mobile payment system in development by a consortium of retailers.  CurrentC is sending emails to people who... Read More »
Inside Twitter's ambitious plan to kill the password | The Verge As he traveled the world last year as part of a user research project, Michael Ducker noticed a problem. ... Read More »
Staples said on Tuesday that it is investigating “a potential issue” with its customers’ credit card data. Staples is investigating a possible data... Read More »
Chinese government launches man-in-middle attack against iCloud | Ars Technica Targeting new iPhone users to capture user credentials, monitors find.
The cost of attacks on large companies is up by 10 percent. Report: Cybercrime costs US $12.7M a year | Ars Technica The cost of attacks on large companies is up by 10 ... Read More »
Suspected Russian “Sandworm” cyber spies targeted NATO, Ukraine | Ars Technica Microsoft patches 0day vulnerability after attackers use it to hack targets.
Don't Listen to Snapchat's Excuses. Security Is Its Job | WIRED If you're a Snapchat user, you should know something: the "Snappening" is not your fault. It is... Read More »
Cyber Security And The Danger Of Ostriches In The Boardroom - Forbes A worldwide survey of almost 10,000 executives and IT directors in 154 countries reveals that global ... Read More »
Lacoon Discovers Xsser mRAT, the First Advanced iOS Trojan The Lacoon Mobile Security research team has discovered a new mRAT it calls €œXsser mRAT.€ The ... Read More »
The FDA takes steps to strengthen cybersecurity of medical devices To strengthen the safety of medical devices, the U.S. Food and Drug Administration today finalized... Read More »
FBI to Open Up Malware Investigator Portal to External Researchers | Threatpost | The first stop for security news The FBI will open up its malware investigator tool to... Read More »
Global security budgets fell 4 per cent in 2014, compared with the year before, according to the survey of almost 10,000 executives and IT directors released by PwC... Read More »
Healthcare Needs Cyber Security Leadership & Governance - InformationWeek Cyber security breaches point to a bigger problem than inadequate security technology or... Read More »
A bit basic, but this article might provide a good jumping off place for a Patently Secure submission. How does cyber warfare work? - Quora Answer 1 of 7: What is... Read More »
Companies’ Worst Hacking Threat May Be Their Own Workers - Bloomberg Fired from a job as a technology contractor for a Toyota Motor Corp. factory in Kentucky... Read More »
The FTC was built 100 years ago to fight monopolists. Now, it’s Washington’s most powerful technology cop. - The Washington Post The century-long story of what's... Read More »