ICYMI: Experts describe how hacking back can be done right; House bill would create a ‘naughty list’ for nation-state hacking groups; Researchers found a semi-legit way to turn an Amazon Echo into a wiretap; Hackers build a ‘Master Key’ that unlocks millions of Hotel rooms; and, North Korea linked to global hacking operation against critical infrastructure, telecoms.
ICYMI: Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer; Could Russia and West be heading for cyber-war? Command and control: A fight for the future of government hacking; Senate passes DHS bug bounty bill; and, ‘iTunes Wi-Fi Sync’ Feature Could Let Attackers Hijack Your iPhone, iPad Remotely
NetCentrics CEO, Cyndi Barreda, recently published an article in Federal Times titled, “How to take the ‘fear factor’ out of federal IT consolidations,” explaining that consolidation is about technology and cost savings, but a truly successful consolidation is also about people, cultural change, customer service, and maintaining the mission.
ICYMI: Careful what you wish for—change and continuity in China’s cyber threats (part 2); Cyber criminals earn up to $2m a year, study shows; College students battle to control the power grid in Energy Department Challenge; Popular Android phone manufacturers caught lying about security updates; Zuckerberg hearing: Grasping — and grasping for — tech terms.
ICYMI: Careful what you wish for—change and continuity in China’s cyber threats; Why North Korean Cyberwarfare is Likely to Intensify; Here comes the next round of encryption legislation; DHS says unauthorized Stingrays could be in D.C. area; and, Atlanta takes down water department website two weeks after cyber attack.