Security Clan Editor's Blog 12/10/2013 Post a comment
The NSA's World of Warcraft and Second Life infiltration plans made sense in 2007, when the plans were made.
Security Clan Editor's Blog 12/4/2013 3 comments
It's UK Prime Minister David Cameron's turn to make no progress with China on cyber-security.
Security Clan Editor's Blog 11/20/2013 2 comments
SANS Institute's NetWars is one example of new age of security training.
Security Clan Editor's Blog 11/6/2013 10 comments
That caller asking about your company's operating system could be a social engineer.
Security Clan Editor's Blog 11/4/2013 2 comments
Not-for-profit (ISC)² responds to the industry's demand for measurable, demonstrable expertise in security, privacy, governance, and ethics within specialized verticals.
Security Clan Editor's Blog 10/30/2013 35 comments
The massive password harvesting reported by Adobe earlier this month is even worse than originally thought.
Security Clan Editor's Blog 10/23/2013 37 comments
Since more than one fourth of millennials have been hacked, security professionals must plan to educate this large group of employees.
Security Clan Editor's Blog 10/16/2013 19 comments
Millennials are generally uninterested in cybersecurity careers -- which is dangerous, given the shortage of experts in this vital field.
Security Clan Editor's Blog 10/9/2013 20 comments
But the audience laughed when the Google executive chairman claimed Android is more secure than Apple iOS.
Security Clan Editor's Blog 10/2/2013 34 comments
Hackers are organizing online courses and fraud-as-a-service offerings where criminals can inexpensively unleash hosted attacks on unwitting victims.
Security Clan Editor's Blog 9/24/2013 27 comments
Apple gave a legion of hostages to fortune when it talked up the security capabilities of its new iPhone and operating system.
Security Clan Editor's Blog 9/18/2013 46 comments
Privacy concerns top annoying posts, nasty online friends, and concerns about social media addiction as reasons for fleeing Facebook.
Security Clan Editor's Blog 9/17/2013 20 comments
Apple's reassurances that iPhone 5s users are not at risk of having their fingers, as well as their phones, hacked, are being greeted with skepticism.
Security Clan Editor's Blog 9/11/2013 26 comments
Apple's move is already putting attention back on biometrics as an alternative -- or complement -- to passwords.
Security Clan Editor's Blog 9/4/2013 10 comments
Thought you were doing enough by securing your computers, servers, networks, phones, and tablets? Think again.
Security Clan Editor's Blog 8/28/2013 17 comments
States are over-reaching with legislation to criminalize online "revenge porn."
Security Clan Editor's Blog 8/21/2013 32 comments
Facebook's response to an honest attempt to report a vulnerability was hostile and mean.
Security Clan Editor's Blog 8/14/2013 21 comments
The City of London has beaten back an imaginative attempt to use garbage cans to track pedestrian traffic.
Security Clan Editor's Blog 8/7/2013 22 comments
Sergey Aleynikov thought he was innocently copying some code before he went off to take a new job. Then he found himself under arrest by the FBI.
Security Clan Editor's Blog 7/31/2013 15 comments
Lenovo systems are banned from "secret" and "top secret" networks in intelligence and defense service in the US, Britain, Canada, and New Zealand.
Security Clan Editor's Blog 7/25/2013 83 comments
Under the British prime minister's new plan, household ISP services just became family friendly – unless you opt out.
Security Clan Editor's Blog 7/17/2013 14 comments
On Thursday, 50 financial firms, government, and law enforcement agencies will participate in Quantum Dawn 2, a cyberattacks drill.
Security Clan Editor's Blog 7/10/2013 24 comments
The latest Android vulnerability emphasizes that open systems have a high security cost.
Security Clan Editor's Blog 7/1/2013 14 comments
Reports have named a former vice-chairman of the Joint Chiefs of Staff as the suspect at the heart of the Stuxnet leak inquiry.
Security Clan Editor's Blog 6/25/2013 47 comments
IT pros can learn from the National Security Agency and Booz Allen Hamilton's failure to screen Edward Snowden for fitness for the job.
Security Clan Editor's Blog 6/24/2013 61 comments
The massive leak of personal information harvested from offsite sources underlines just how much data Facebook is collecting and storing – and how hazy the concept of "consent" is.
Security Clan Editor's Blog 6/18/2013 40 comments
Surveillance leaker Edward Snowden is insisting that technology companies' denials of the Prism program are misleading.
Security Clan Editor's Blog 6/11/2013 36 comments
Properly explained, the Prism program doesn't seem so scandalous. In fact, there isn't a Prism "program" at all.
Security Clan Editor's Blog 6/5/2013 29 comments
The Veteran Affairs Department revealed yesterday that its databases have been under attack for several years -- likely by the Chinese military.
Security Clan Editor's Blog 5/29/2013 20 comments
Asking for international standards on cyberwarfare is a waste of virtual breath.
Security Clan Editor's Blog 5/21/2013 21 comments
Security experts rip into plans to extend wiretap laws to cover P2P Internet communications.
Security Clan Editor's Blog 5/15/2013 17 comments
The government's hunt for whistleblowers is heating up, with journalists' phone records being secretly seized by investigators.
Security Clan Editor's Blog 5/8/2013 14 comments
If a spyware vendor is using a legitimate Internet brand as cover for its intrusions, judicial intervention is needed.
Security Clan Editor's Blog 5/1/2013 41 comments
Which technology services go the extra yard in defense of your data? The EFF's new survey has some suprising results.
Security Clan Editor's Blog 4/24/2013 18 comments
Yesterday's hack of the official Associated Press Twitter feed reminds us that Twitter's security is woefully inadequate.
Security Clan Editor's Blog 4/17/2013 15 comments
Spam emails referencing news about the Boston bombings come loaded with malware.
Security Clan Editor's Blog 4/10/2013 54 comments
Yet another (minor) public figure learns the hard way that tweets aren't private.
Security Clan Editor's Blog 4/3/2013 9 comments
An attack on a major submarine cable demonstrates the Internet's major vulnerability to sabotage.
Security Clan Editor's Blog 3/27/2013 11 comments
A feud between a spam filtering service and a hosting service has exploded into the largest DDoS attack in history.
Security Clan Editor's Blog 3/20/2013 6 comments
With law firms potentially more vulnerable to hacking than enterprises, it's time to check that your attorney is up to the task of securing your data.
Security Clan Editor's Blog 3/13/2013 11 comments
Michelle Obama is one of several celebrities to have private financial information posted on a Russian website.
Security Clan Editor's Blog 3/6/2013 12 comments
Security Clan Editor's Blog 2/27/2013 36 comments
MiniDuke is a sophisticated attack on governments. Could enterprises be next?
Security Clan Editor's Blog 2/20/2013 34 comments
A unit of China's army is allegedly the origin of most anti-US corporate hack attacks.
Security Clan Editor's Blog 2/13/2013 9 comments
Shodan is a search engine that exposes the deep flaws in Internet security.
Security Clan Editor's Blog 2/6/2013 38 comments
Google's redesigned Image Search raises serious intellectual property questions.
Security Clan Editor's Blog 1/30/2013 6 comments
More questions than answers, as an Iranian hacktivist group proclaims a suspension of DDoS attacks on US banks.
Security Clan Editor's Blog 1/23/2013 51 comments
Google research on alternative authentication methods is disappointing, and even regressive.
Security Clan Editor's Blog 1/14/2013 31 comments
Swartz took his own life in the face of what his allies describe as prosecutors run amok.
Security Clan Editor's Blog 1/9/2013 18 comments
A nation-state attack on financial institutions, via the cloud, is almost exactly what we should have expected.
a moderated blogosphere of internet experts
IETV: the thinkerNet on film
an IBM information resource
an IBM information resource
Expert Integrated Systems: Changing the Experience & Economics of IT
In this e-book, we take an in-depth look at these expert integrated systems -- what they are, how they work, and how they have the potential to help CIOs achieve dramatic savings while restoring IT's role as business innovator.
READ THIS eBOOK
your weekly update of news, analysis, and
opinion from Internet Evolution - FREE!
Wanted! Site Moderators
Internet Evolution is looking for a handful of readers to help moderate the message boards on our site as well as engaging in high-IQ conversation with the industry mavens on our thinkerNet blogosphere. The job comes with various perks, bags of kudos, and GIANT bragging rights. Interested?
Please email: email@example.com