Chris Soghoian on Lessons from the Bin Laden Raid and Cyberwar

Chris Soghoian has made a name for himself as a security and privacy researcher and has been the bane of government agencies and organizations prone to being somewhat less than upfront about their security and privacy practices. In this video from the Personal Democracy Forum in New York this week, Soghoian discusses the implications of the U.S. government’s raid on Osama Bin Laden and usage of offensive cyberwar weapons such as Stuxnet and Duqu.

As smartphone technology evolves so does the way we access and interact with the Internet. Today your smartphone is used both as a phone and a computer. For many users, in 3-5 years your smartphone will also become your wallet. With new applications being developed daily, the mobile payments market is expected to reach unprecedented  growth by 2014. As this market rapidly expands, is security taking a back seat to technology?

Microsoft’s warning of a vulnerability in its XML Core Services 3.0, 4.0, 5.0 and 6.0 that allows remote code to be executed if a victim is convinced to visit a malicous Web site using Internet Explorer. The actively exploited security hole affects all supported Windows releases and all supported editions of Office 2003 and 2007.

Privileged accounts have become an important attack vector, and if a recent survey of mostly IT managers and executives is any indication that threat will continue to grow.

According to results of ID management provider Cyber-Ark’s sixth annual global “Trust, Security and Passwords Survey,” just under half of 820 respondents admitted if they were fired tomorrow, they’d walk out with proprietary data such as privileged password lists, company databases, R&D plans and financial r

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.