Information Security in Today's Digital Culture
Header

Before deciding to participate in your favorite online games, you might be interested to know what the government is potentially cooking up that would potentially allow them to monitor your online gaming activities. Jason StaggsJason is True’s Security Analyst Intern and is currently a senior at Oklahoma State University. He is pursuing his Bachelors in …
Read more

On Stuxnet Adaptation

March 21st, 2012 | Posted by Andrew Ridings in Malware | Terrorism - (0 Comments)

With the recent focus on Stuxnet due to the CBS 60 Minutes Special: Stuxnet: Computer worm opens new era of warfare and the 60 Minutes Overtime special Stuxnet copycats: Let the hacking begin, aired earlier this month, I was reminded of the extent our nation’s critical infrastructure is at risk from cyber attack. Andrew RidingsAndrew …
Read more

On the morning on November 7, while folks in my part of the country (Oklahoma) were still trying to come to grips with being rocked by two damage-causing earthquakes in less than 24 hours (that’s unheard of for OK), a previously unknown software bug in the BGP function of Juniper routers caused a major hiccup …
Read more

Reuters is reporting[reuters.com] that Canadian soldiers have been ordered not to post personal information to social networking sites like MySpace[myspace.com] and Facebook[facebook.com]. The apparent motive is safety – “Al Qaeda operatives are monitoring Facebook and other social networking sites.” Many have heard of the potential effects that sharing the wrong information online can have on …
Read more

The new Boeing 787 Dreamliner has been widely reported as a feat of technological engineering. The plane has three separate networks on-board: an administrative network, a flight control/navigation network, and a passenger network. Everything about this plane seems cool from the Ethernet jacks in the armrest of every seat, to the completely computerized flight controls …
Read more