How I caught my online scammer – and Facebooked his mom

Posted by & filed under App Economy, Cyber Security.

A cybersecurity researcher living in Austria who was scammed out of $500 says his money was returned after he tracked down the scammer’s family and contacted them on Facebook. Source: BBC Technology Date: September 14th, 2016 Link: Discussion 1) “He had decided to accept payment in the digital currency as he thought it would be less of… Read more »

Who are the hackers who cracked the iPhone?

Posted by & filed under Civil Liberties, Competitive Advantage, Cyber Security, Electronic Surveillance.

  The cyber arms NSO Group was founded in 2010 and is based in Herzliya, an attractive city north of Tel Aviv that is known as being a cluster of tech start-ups. The group was likely funded by the elite 8200 Intelligence Unit, an Israeli military-funded scheme for start-ups. Source: BBC Technology Date: September 1st, 2016 Link:… Read more »

Thailand’s students reveal their vice — cheating by device

Posted by & filed under Competitive Advantage, Cyber Security, Ethical issues, Fraud.

  This is a confiscated smartwatch showing a student’s math data.  In Thailand, being brought up to be polite, tolerant, and respectful hasn’t prevented rampant cheating on university entrance exams, now aided by embedded cameras, smartwatches and all other manner of high tech gear. Source: Toronto Star Date: September 1st, 2016 Link: 1) How might you prevent… Read more »

Are hi-tech spies stealing all your firm’s secrets?

Posted by & filed under Cyber Security.

Last weekend’s reports about the New Zealand rugby team’s discovery of a listening device sewn in to a hotel meeting room chair, have illustrated just how much spying technology has advanced in recent years.  These days, you don’t need to sit outside in a van with your headphones on, listening to static for an hour… Read more »


Posted by & filed under Business Intelligence, Civil Liberties, Competitive Advantage, Cyber Security, Ethical issues, Fraud, IT Security.

  The whistleblower Edward Snowden believes Russia is behind a leak of malware allegedly belonging to the US National Security Agency (NSA).  Hackers calling themselves Shadow Brokers started an auction for the malware last week.  The malware is used by the NSA to attack or counter-attack in cyberspace. Source: BBC Technology Date: August 17th, 2016 Link: Discussion… Read more »

Who is watching you online?

Posted by & filed under Big Data, Business Intelligence, Civil Liberties, Competitive Advantage, Cyber Security, Electronic Surveillance, Email.

Around 40 million UK adults – 78% of us – go online every day or almost every day. By posting on social media, booking tickets or buying a DVD, we add to the 2.3 billion gigabytes of internet data created daily.  The data trail we leave on our online journey says much about our habits… Read more »

Help! My building has been hacked

Posted by & filed under Cyber Security, DoS/Denial of Service, Electronic Surveillance, Ethical issues, Fraud.

Two cybersecurity experts hacked into its Wharf 7 office in Sydney, Australia, through Google’s building management system (BMS).  “Once you understand how the systems work, it is very simple.”  The vulnerable systems were found on Shodan, a search engine that lists devices connected to the internet. Source: BBC Technology Date: April 28th, 2016 Link: Discussion 1) If… Read more »

US Supreme Court approves expanded hacking powers

Posted by & filed under Big Data, Cyber Security, Electronic Surveillance, IT Security.

The US Supreme Court has approved a rule change that could allow law enforcement to remotely search computers around the world.  Previously, magistrate judges could order searches only within the jurisdiction of their court, often limited to a few counties.  The US Department of Justice (DoJ) said the change was necessary to modernise the law… Read more »

How to make big bucks hunting cyber bugs

Posted by & filed under Cyber Security.

This month the US government is launching its first-ever bug bounty programme – a 20-day scheme for cybersecurity savvy citizens to have a go at finding flaws in the Department of Defense’s public websites before the illegal hackers do.  There is a $150,000 (£106,000) pot for rewarding the finders of significant bugs. Source: BBC Technology Date: April… Read more »