Obama, China’s Xi to discuss cyber security in June meeting
See on news.yahoo.com
Today’s malware attack has been brought to you by the RIAA InfoWorld (blog) Additional measures go further, including photographing the hacker using his own system’s camera, implanting malware in the hacker’s network, or even physically disabling…
See on www.infoworld.com
Microsoft Warning: Free Software Could Contain Hidden Malware CRN Freely available software tools can be bundled with malware designed to steal data, including account credentials, according to a Microsoft researcher who discovered and analyzed a…
See on news.google.com
Harvard dean resigns after facing backlash for authorizing email hacking …
A top Harvard University dean has resigned from her post after facing backlash for authorizing email searches during a college cheating scandal.
See on www.dailymail.co.uk
The Network and Malware, Part Deux
Mike talked about the first part of what most people see as a timeline for dealing with malware: ideally, you should be detecting it early so that you can stop it before it reaches a vulnerable target.
See on www.darkreading.com
Hacking: everyone’s doing it ABC Online But there is an emerging phenomenon whereby governments, particularly some of the smaller, less wealthy governments, are starting to enter into partnerships with private sector cyber entities that are very…
See on www.abc.net.au
New York Times
SoftBank and Sprint Said to Win National Security Clearance for Deal
New York Times
Koji Sasahara/Associated PressSoftbank’s president, Masayoshi Son, left, and Dan Hesse, Sprint’s chief executive, last October.
See on dealbook.nytimes.com
Chinese hacking and abuse apologies: The Mini Roast – video
Tom Glasson and The Roast team take a sideways look at the alleged Chinese hacking of Asio, along with Cardinal Pell’s apology over church child abuse.
See on www.guardian.co.uk