adversaries

adversaries

Pentagon to expand cybersecurity program for defense contractors

www.washingtonpost.com
The Pentagon is expanding and making permanent a trial program that teams the government with Internet carriers to protect defense firms’ computer networks against massive data theft by foreign adversaries. Read full article >>...
Pentagon to expand cybersecurity program for defense contractors

The cybersecurity circus comes full circle: Lieberman calls for mandatory standards in executive order

thenextweb.com
Words cannot contain my mirth. Today in a letter, Senator Lieberman called on the President to include mandatory cybersecurity standards in his potential executive order on the issue. Before we dig too far into exactly what this means, why it is funny, and how in fact we have come full...
The cybersecurity circus comes full circle: Lieberman calls for mandatory standards in executive order

Here's What The "Fiscal Cliff" Tax Deal Is Starting To Look Like...

www.businessinsider.com
Barack Obama and Republicans grope towards common ground on taxes... THE election dust had barely settled when Barack Obama and his Republican adversaries returned to their traditional rhetoric over taxes. "Raising tax rates is unacceptable," John Boehner, the Speaker of the House of Representatives, declared on November 8th. The next...
Here's What The "Fiscal Cliff" Tax Deal Is Starting To Look Like...

Even the CIA is struggling to deal with the volume of real-time social data

gigaom.com
Thanks to spy movies and other entertainment fare, we all have our own picture of what the Central Intelligence Agency is like — but the agency’s chief technology officer, Ira “Gus” Hunt, told attendees at GigaOM’s Structure:Data conference that just like any other company, the intelligence division has to somehow...
Even the CIA is struggling to deal with the volume of real-time social data

Fault lines: The lesser known wars in high technology

thenextweb.com
In TNW’s ever-running communications back channel, I tossed out a few technology relationships that I found to be significant and, often, contentious. This post is an extension of those thoughts. Who is your friend? Assuming that the enemy of your enemy is your friend, then it might stand to reason that if...
Fault lines: The lesser known wars in high technology

Must See HDTV (November 5th - 11th)

www.engadget.com
Halo 4 After more than a decade the Halo series is still going strong, although development has moved from Bungie to 343 Industries. Fans shouldn't let that switch worry them however, as Joystiq's review assures it is a "decadent show of strength" for the series that lives up to...
Must See HDTV (November 5th - 11th)

Copyright Trolls Order WordPress To Hand Over Critics' IP Addresses

torrentfreak.com
Copyright trolls, wherever they try to do business in the world, meet resistance. Their work is appreciated by few outside of their inner circle and often frowned upon by fellow law firms, copyright owners and the public, who see their work as one step away from outright extortion. While they...
Copyright Trolls Order WordPress To Hand Over Critics' IP Addresses

Google, Samsung join Apple and other adversaries to buy Kodak patents, perhaps signaling intent to curtail litigation

9to5google.com
It must be a cold day in Hell. Google and Samsung are consorting with Apple, LG Electronics, and various ventures and firms to bid as a group on Kodak’s intellectual property. Kodak filed for bankruptcy protection in January, according to The Wall Street Journal, and it is looking to auction...
Google, Samsung join Apple and other adversaries to buy Kodak patents, perhaps signaling intent to curtail litigation

Activision and No Doubt settle Band Hero lawsuit

news.cnet.com
The two adversaries settle the nearly three-year lawsuit after claims that the video game avatar of Gwen Stefani made her sing in a male voice and boast about having sex with prostitutes. [Read more]...
Activision and No Doubt settle Band Hero lawsuit
NSA: foreign adversaries in US military networks might be too plentiful to stop

Ford's 2013 C-Max Energi rolls out 95 MPGe, will cost you $26k when it arrives this fall

www.engadget.com
There's no question America's favorite Motor Company faces a hefty amount of competition in the eco-friendly cars department, but the outfit is hoping to lure some green humans away from its adversaries with the upcoming C-Max Energi series. Interestingly enough, but not surprisingly, Ford's touting the 2013 Energi's cheaper...
Ford's 2013 C-Max Energi rolls out 95 MPGe, will cost you $26k when it arrives this fall

To Save Everything, Click Here by Evgeny Morozov - review

www.guardian.co.uk
Morozov takes a hard look at the claims of cybertheorists and concludes that our techno future might not be as groovy as they claimNewsflash: the internet doesn't exist. If you think there is just one thing called "the Internet" with a single logic and set of values - rather than a...
To Save Everything, Click Here by Evgeny Morozov - review
Did The Federal Prosecutors Treat Aaron Swartz Too Harshly?

Snowden revelations a threat to US-China relations, says Beijing

www.guardian.co.uk
State-run China Daily points to countries' 'soured relationship' on cybersecurity and suggests huge surveillance net is unjustifiedChina has warned that revelations of electronic surveillance on a huge scale by American intelligence agency the NSA will "test developing Sino-US ties" and exacerbate their "soured relationship" on cybersecurity.The assessment in an article...
Snowden revelations a threat to US-China relations, says Beijing

Twitter fiction: Tim Lott

www.guardian.co.uk
The novelist and journalist takes up our Twitter-based challenge to come up with a story in 140 characters or fewerNothing happened. Then it did. Adventures ensued. Helpers, adversaries came. He lost everything. Then, redemption. He was changed - forever.• Under The Same Stars by Tim Lott is published by Simon &...
Twitter fiction: Tim Lott

Skype says scam calls on a steady decline

www.computerworld.com
Skype has been battling wily adversaries who are abusing the Internet calling application to direct people to scam websites, but the Microsoft-owned service says the sham calls are decreasing....
Skype says scam calls on a steady decline
Confirmed: Spotify Apps coming to mobile & web in January

Prosecutor: Manning shared data without regard for national security

www.pcworld.com
U.S. Army Private First Class Bradley Manning accused of sharing thousands of classified government documents with WikiLeaks, knew that the information would aid enemies of the U.S., a prosecutor argued Monday.Manning, facing a court martial on 12 charges at Fort Meade, Maryland, endangered U.S. national security when he "systematically...
Prosecutor: Manning shared data without regard for national security

MICROSOFT: We Got Hacked Too!

www.businessinsider.com
Microsoft has announced that it was the victim of a cyberattack, similar to what happened to Facebook and Apple. "We found a small number of computers, including some in our Mac business unit, that were infected by malicious software using techniques similar to those documented by other organizations," a Microsoft...
MICROSOFT: We Got Hacked Too!

Cybersecurity Bill Rhetoric Heats Up in Washington

www.pcworld.com
President Barack Obama says foreign adversaries could seek to exploit U.S. computer vulnerabilities, taking down vital banking systems, and that could cause a financial crisis....
Cybersecurity Bill Rhetoric Heats Up in Washington

Researcher advises against use of Sophos antivirus on critical systems

arstechnica.com
Antivirus provider Sophos has fixed a variety of dangerous defects in its products that were discovered by a security researcher who is recommending many customers reconsider their decision to rely on the company. "Sophos claim that their products are deployed throughout healthcare, government, finance, and even the military," Tavis Ormandy...
Researcher advises against use of Sophos antivirus on critical systems

It's not enough to just have information -- intelligence requires context

gigaom.com
The U.S. intelligence community has plenty of information about the countries and regions where its adversaries operate, but it needs more than that — it needs better ways to understand the context of that information, and how it changes over time, Samantha Ravich told attendees at GigaOM’s Structure:Data conference in...
It's not enough to just have information -- intelligence requires context

What your personal brand can learn from the legend of the ninja

www.christopherspenn.com
What your personal brand can learn from the legend of the ninja The ninja warriors of old were greatly feared by their adversaries – shadowy operatives with superhuman powers that could single-handedly turn the tide of battle or bring clandestine death to their enemies. The ninja were capable of nearly...
What your personal brand can learn from the legend of the ninja

Scam calls via Skype are declining, Microsoft reports

www.pcworld.com
Skype has been battling wily adversaries who are abusing the Internet calling application to direct people to scam websites, but the Microsoft-owned service says the sham calls are decreasing. The automated calls feature a computer-generated voice that tells the victim to visit a specific website, which often is selling...
Scam calls via Skype are declining, Microsoft reports

Apple-HTC terms are consistent with what Steve Jobs told Eric Schmidt (but not with his biography)

www.fosspatents.com
The public filing of the Apple-HTC license agreement, with the exception of its financial terms and a few details, is the most important smartphone patent news in the build-up to the Apple-Samsung injunction hearing. I have just commented on the scope of the agreement, which is limited by an anti-cloning...
Apple-HTC terms are consistent with what Steve Jobs told Eric Schmidt (but not with his biography)
Flawed sign-in services from Google and Facebook imperil user accounts

Kim Dotcom says Twitter, Facebook refuse to recognize him

arstechnica.com
Kim Dotcom, the Megaupload mogul, in addition to having a rough time with American and New Zealand government authorities, has two new adversaries to worry about: Twitter and Facebook. Twitter has declined to verify his account, and he’s also not accepted on Facebook, as the social network appears not to...
Kim Dotcom says Twitter, Facebook refuse to recognize him

China Sees Cyberwar as Reducing US Advantage In Future Conflict

allthingsd.com
It’s one thing to read news reports concerning the latest report to Congress by the US Department of Defense on China’s latest military activities. But with regard to China’s evolving stance and capabilities in the cyber-arena, it’s especially interesting to read the original report. I did just that this morning....
China Sees Cyberwar as Reducing US Advantage In Future Conflict
Computer game secures crypto systems from rubber hose attacks

Wikileaks leaks classified intelligence report about itself

arstechnica.com
Wikileaks, a Web site aims to boost government transparency and accountability by publishing sensitive documents, has released a classified military counterintelligence analysis report that discusses the "threat posed to the US Army" by Wikileaks itself. The report outlines this perceived threat and contends that the military security could be...
Wikileaks leaks classified intelligence report about itself
× Just a test of the new info bar. What do you think?