article thumbnail

December’s Reimagining Democracy Workshop

Schneier on Security

Indeed, as a technologist who studies complex systems and their security , I believe the very idea of representative government is a hack to get around the technological limitations of the past. In December 2022, I organized a workshop to discuss these and other questions. And, more generally, whose interests are taken into account?

article thumbnail

CISO workshop slides

Notice Bored

Security Posture suggests a confusing mix of application and account security metrics. A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning.

CISO 63
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Update 185

Troy Hunt

Did I do the Aussie workshops last week? I actually lost track of what week it was at the start of this video. Or the week before? I know I was at home so. it's just all becoming a blur. But be that as it may, life marches on and this week like every other one before it was full of interesting cyber-things.

article thumbnail

Remotely hack a Mercedes-Benz E-Class is possible, experts demonstrated

Security Affairs

Chinese researchers discovered tens of vulnerabilities in a Mercedes-Benz E-Class, including issues that can be exploited to remotely hack it. “For accessing the APN networks of backend, one possibility would be using the e-sim of car-parts since the sim account wouldn’t log out automatically. ” continues the research.

Hacking 145
article thumbnail

Database of the FBI’s InfraGard US Critical Infrastructure Intelligence portal available for sale

Security Affairs

The portal of the FBI’s InfraGard US Critical Infrastructure Intelligence was hacked, and data is available for sale on a cybercrime forum. The attacker applied for an account in November and by early December the account had been surprisingly approved. SecurityAffairs – hacking, FBI). Critical Infrastructure.

article thumbnail

Emotions Used in Human Hacking

Security Through Education

Malicious actors use emotions in human hacking with a high success rate. For example, a phony email stating that your online bank account has been compromised and requires a new password will elicit fear in most people. Eventually the target would share their bank account information in order to receive the reward. Helpfulness.

article thumbnail

National Cybersecurity Alliance advocates ‘shared responsibility’ for securing the Internet

The Last Watchdog

One program, for instance, puts on workshops for Congressional staffers and other federal employees on how to recognize and avoid nation-state backed hackers looking to interfere in elections. So we’ve boiled the NIST framework down into a very focused workshop exercise. A large retailer may spend millions on cyber security.

Internet 160