Testimony of Robert D. Atkinson President Information Technology and Innovation Foundation Before the House Committee on Foreign Affairs Subcommittee on Asia and the Pacific, Hearing onChina’s Technological Rise:Challenges to U.S. Innovation and Security, April 26, 2017 Washington, DC, 28 pages
Friday, April 28, 2017
Posted by Daniel Ventre at 11:55 PM
"Governing the “Digital Shadows”: Public Policy and Information Communication Technology (ICT) Acquisition and Utilization in Africa. Article by Ebenezer Olatunji Olugbenga, Open Access Library Journal, https://doi.org/10.4236/oalib.1103564, 23 pages
Posted by Daniel Ventre at 11:51 PM
Remarks by OSCE Secretary General Lamberto Zannier, 6th Moscow Conference on International Security, 26 April 2017, 4 pages.
"The norms and principles that underpinned the international order for decades are being contested. Some tools have become obsolete, and we are struggling to develop policies to address new challenges like cyber-threats. In this regard, we have some measures in place to prevent conflict stemming from cyber-threats, but implementation is lacking."
Posted by Daniel Ventre at 11:48 PM
Thursday, April 27, 2017
"Attacks with Exploits: from everyday threats to targeted campaigns" - Kaspersky Lab Report, April 2017, 28 pages.
"An ‘exploit’ is a computer program created to take advantage of a security vulnerability in another software program. Exploits provide malicious actors with a way of installing additional malware on a system". According to the conclusions of the report, "in 2016 the number of attacks with exploits increased 24.54%, to 702,026,084 attempts to launch an exploit." but "4,347,966 users were attacked with exploits in 2016 which is 20.85% less than in the previous year."
Posted by Daniel Ventre at 2:20 AM
"The "Smart" Fourth Amendment", article by Andrew Guthrie Ferguson, Cornell Law Review, Vol.102, pp.547-632, 2017. "This Article addresses the question of how the Fourth Amendment should protect “smart data.” It exposes the growing danger of sensor surveillance and the weakness of current Fourth Amendment doctrine. The Article then suggests a new theory of “informational curtilage” to protect the data trails emerging from smart devices and reclaims the principle of “informational security” as the organizing framework for a digital Fourth Amendment."
Posted by Daniel Ventre at 2:02 AM
"Cybersecurity: Critical Infrastructure Authoritative Reports and Resources", by Rita Tehan - CRS Report. April 21, 2017, 43 pages. This document provides a lot of information about critical infrastructures in the U.S (through a sectorial presentation: energy, financial industry, health, telecommunications, transports), and their vulnerabilities to cyber operations (for instance, let's notice that "U.S. critical infrastructure systems experienced a 20% increase in attempted cybersecurity breaches in FY2015, ICS-CERT responded to 295 cybersecurity incidents involving critical infrastructure, compared with 245 in fiscal 2014").
Posted by Daniel Ventre at 1:57 AM
Symantec - Internet Security Threat Report. Vol. 22, April 2017, 77 pages.
"The Symantec Global Intelligence Network tracks over 700,000 global adversaries and records events from 98 million attack sensors worldwide. This network monitors threat activities in over 157 countries and territories through a combination of Symantec products, technologies, and services, including Symantec Endpoint Protection™, Symantec DeepSight™ Intelligence, Symantec Managed Security Services™, Norton™ consumer products, and other third-party data sources, generating more than nine trillion rows of security data... " Download the report.
Posted by Daniel Ventre at 1:50 AM