Understanding the Simplicity Behind IoT Botnets: A Case Study of a Social Media Fraud Provider Masarah Paquet-Clouston, GoSecure Presented at the SERENE-RISC Workshop, April 2017 Who would want to be liked by an army of robots? The size of a social media account’s audience is considered to be a measure of the influence of a …
The IISP (Institute of Information Security Professionals) and our friends the Cyberacademy at Napier College, Edinburgh, Scotland recently (2017/11/23) held an event for those looking to start or continue a career in cybersecurity. The event had a number of great presenters and fortunately for us was streamed to youtube. The full video is over 5 …
Short answer is bad, but for more reasons than first come to mind. Wikileaks recently released a vault of documents allegedly from the CIA relating to their cyber capabilities[1]. This is not the first time that Wikileaks has released fairly targeted documents against an agency in the United States[2][3][4][5]. Wikileaks founder Julian Assange has clear …