Cyber Security Intelligence

Twitter< Follow on Twitter>


Newsletter August #3 2015

This Newsletter reaches over 5,000  IT and Cyber Security professionals weekly: Contact us here for information on partnership & sponsorship opportunities. 

Russia, China & U.S. Engage in Cyber War

The cyber warfare between the U.S., Russia and China is part of an overall epoch-defining conflict between three nations.  read more  As the dynamics of warfare are changing along with the threat landscape, how do nations fight a cyber-battle?  read more

 

The NSA Playset: 5 Better Tools To Defend Systems

Cutting edge security tools made accessible & easier to use, tapping into the open source software community.  read more

 

Switzerland & Austria Investigate Claims of Electronic Spying at Iran Talks

A computer virus was used to spy on the recent high-level Iran nuclear talks. Who would do that?  read more

 

Predictive Policing Technology Arrests

An intelligence led computer programme that uses an algorithm to pin-point and send officers to zones where crime is most likely to occur.  read more

 

France & the UK on the Edge of Kafkaesque Surveillance

Are the surveillance  tools that France and Britain are using too blunt and intrusive for modern democracies?  read more

 

Artificial Intelligence Decodes ISIS

Artificial intelligence is being used to gain insights into the tactics of Islamic State.  read more

 

No. Petition to Pardon Snowden Rejected by Obama

The U.S.President and a majority of lawmakers  maintain that Snowden must be prosecuted for violating the law.  read more

 

HTC: Rendered Worthless By Insecurity

Competition from above and below, combined with a shocking security lapse, knock HTC for six.  read more

 

Darwinian Robotic Evolution

It's Possible: Artificial evolution of physical systems to create self-learning, self- improving robots.  read more

 

Twitter Says U.S Government  Want More User  Account Information

Twitter reveals that requests for account information from governments has jumped 52%,  mostly to do with criminal investigations.  read more

 

Hacking Critical Infrastructure: How-To Guide

Cyber-aided physical attacks on critical infrastructure are a growing concern. How to pull them off and how to defend against them.  read more

 

US Internet Giants Join to Curb Child Sex Abuse

Facebook, Google, Microsoft, Twitter and Yahoo are doing  the right thing.  read more


New monthly Directors Report coming soon: Contact us here for details

SUBSCRIBE TO THIS NEWSLETTER