Search
Patexia Interest Groups

Cyber Security > Summary

Cyber security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The term computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The strategies and methodologies of computer security often differ from most other computer technologies because of its somewhat elusive objective of preventing unwanted computer behavior instead of enabling wanted computer behavior.

Description courtesy of Wikipedia. Photo: System Code by Yuri Samoilov available under CC BY 3.0.

The carrier said that “approximately 110,000 pieces of customer data may have been compromised,” although this number could increase to 750,000 if the... Read More »
Apple knew of iCloud API weakness months before celeb photo leak broke | Ars Technica Security researcher reported brute force attacks were possible in March.
A recent report published by Reuters found that medical information is now worth 10 times the price of credit card information, with individual patient data worth... Read More »
Apple's Touch ID still vulnerable to hack, security researcher finds - CNET The fingerprint reader on the iPhone 6 can be fooled by the same trick that unlocks the... Read More »
What It's Like To Use North Korea's Internet ⚙ Co.Labs ⚙ code + community Even the country's 2 million mobile phone subscribers can't see outside the borders... Read More »
New research suggests that it isn’t the technologically illiterate who fall for the promise of a legacy from a Nigerian prince – the more you use Facebook, ... Read More »
Moving into a grey area.  Any thoughts? Kevin Mitnick, Once the World's Most Wanted Hacker, Is Now Selling Zero-Day Exploits | WIRED Mitnick showing a keylogging... Read More »
Should lead to interesting discussion, especially given the extent to which advanced devices are often networked The FDA wants to talk about medical device... Read More »
Good timing for them given all of the public attention paid to the cyber attacks on Home Depot and JPMorgan Chase  CyberArk Breaks Israel’s Security IPO ... Read More »
I don't know, is this a positive step forward or too invasive?  Also, serious concerns about what happens if the bracelet gets stolen from the user or... Read More »
Cool study using a decoy industrial-control computer to test attack frequency by location. A Decoy Computer Was Set Up Online. See Which Countries Attacked It the Most ... Read More »
Another example of just how important cyber security is.  Very few products are completely devoid of computers to the point where cyber attacks are of no... Read More »
Cyber attacks innovate constantly, and the solutions must as well.  This article looks as startups as a force for innovation in the world of cyber security... Read More »
Xiaomi is still at a point where it is heavily borrowing design and functionality, rather than innovating.  But it is still a major name to watch as it comes ... Read More »
Steve Herrod, a former VMware CTO and now a venture capitalist, discusses what he's investing in today and why security is his top priority  ... Read More »
A peak at the Malvertisement Network responsible for placing malicious advertisements on big websites like amazon.com, ads.yahoo.com... Read More »
Interesting look at what someone who spends all of her time thinking about data protection thinks you should do to keep yours safe... Read More »
Really interesting comparison of points of view on cyber security.  I wonder where the truth lies?  On one hand we have the head of New York State’s... Read More »
Comments
Anonymous Here is the full article with comments from Benjamin Lawsky, superintendent of the Department of Financial Services (DFS) for the state of New York. http://www.reuters.com/article/2014/09/22/us-regulator-cybersecurity-lawsky-idUSKCN0HH2J020140922
Sep 23, 2014
An interesting look at some innovative technologies being developed to preempt future cyber attacks against critical infrastructure. Protecting the Power Grid From... Read More »
Menu