The Weaponization of Information: The Need for Cognitive Security | RAND
The Weaponization of Information: The Need for Cognitive Security | RAND: Apparently information can be a weapon.
Hilarious Irish homemade movie about an IRA ASU
Hilarious Irish homemade movie about an IRA ASU: Part 1: https://m.youtube.com/watch?v=IredxtwG2ZU Part 2: https://m.youtube.com/watch?v=t2SjDUy7h70 Part 3: https://m.youtube.com/watch?v=BzaxtXmfS_0
bellingcat – Russia Seeks to Influence European Politics Through Youth Wings of Far-Right and Far-Left Parties – bellingcat
bellingcat - Russia Seeks to Influence European Politics Through Youth Wings of Far-Right and Far-Left Parties - bellingcat
Configuring YubiKey for GPG and U2F
Here is a little walkthrough on how to get started with the YubiKey and GPG. After following this guide you will have a secure setup using a YubiKey containing your GPG keys as well as an authentication key that could be used for SSH. Moreover the configured YubiKey will also be capable of U2F and managing…
Upcoming Cloudflare events: Berlin May 5-7, Austin & Portland May 11
Attending JS Conf EU, CSS Conf, or OSCON in the next couple of weeks? Live in Berlin or Austin or Portland? Come over and join Cloudflare devs in the area at our upcoming events. JS Conf EU 2016. Photo by Holger Blank. In Berlin? Attending JS Conf EU or CSS…
Upcoming Cloudflare events: Berlin May 5-7, Austin & Portland May 11.
Attending JS Conf EU, CSS Conf, or OSCON in the next couple of weeks? Live in Berlin or Austin or Portland? Come over and join Cloudflare devs in the area at our upcoming events. JS Conf EU 2016. Photo by Holger Blank. In Berlin? Attending JS Conf EU or CSS…
Information operations – Facebook
Information operations - Facebook : Great paper defining excellent terminology.
Blind Trust in Email Could Cost You Your Home
The process of buying or selling a home can be extremely stressful and complex, but imagine the stress that would boil up if — at settlement — your money was wired to scammers in another country instead of to the settlement firm or escrow company. Here’s the story about a phishing…
Next Steps Toward More Connection Security
Posted by Emily Schechter, Chrome Security TeamIn January, we began our quest to improve how Chrome communicates the connection security of HTTP pages. Chrome now marks HTTP pages as “Not secure” if they have password or credit card fields. Beginning in October 2017, Chrome will show the “Not secure” warning…
Next Steps Toward More Connection Security
Posted by Emily Schechter, Chrome Security TeamIn January, we began our quest to improve how Chrome communicates the connection security of HTTP pages. Chrome now marks HTTP pages as “Not secure” if they have password or credit card fields. Beginning in October 2017, Chrome will show the “Not secure” warning…
Punching holes in nomx, the world’s “most secure” communications protocol
Enlarge / Artist's impression of a nomx product under the scrutiny of security researchers. (credit: Aurich/ThinkStock/Nomx) This article was originally published on Scott Helme's blog and is reprinted here with his permission. I was recently invited to take part in some research by BBC Click, alongside Professor Alan Woodward, to…
Blunting the Impact of a Knife Attack – Stratfor Worldview
Blunting the Impact of a Knife Attack - Stratfor Worldview: Stanfor’s practical guide to dealing with a knife attack. Very practical.
Introducing Cloudflare Orbit: A Private Network for IoT Devices
In October, we wrote about a 1.75M rps DDoS attack we mitigated on our network, launched by 52,467 unique IP’s, mostly hacked CCTV cameras. We continued to see more IoT devices in DDoS attacks, and so we started to put together a security solution to protect the devices from becoming…
Introducing Cloudflare Orbit: A Private Network for IoT Devices
In October, we wrote about a 1.75M rps DDoS attack we mitigated on our network, launched by 52,467 unique IP’s, mostly hacked CCTV cameras. We continued to see more IoT devices in DDoS attacks, and so we started to put together a security solution to protect the devices from becoming…