Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does.
Please leave a REVIEW (iPhone or iPad) – https://itunes.apple.com/WebObjects/MZStore.woa/wa/viewContentsUserReviews?id=857124890&type=Podcast&ls=1&mt=1
Support the Average Guy Tech Scholarship Fund: https://www.patreon.com/theaverageguy
You can contact us via email at email@example.com
Full show notes and video at http://theAverageGuy.tv/cf034
This week on Cyber Frontiers Christian and Jim recap on how 2016 shaped up for cyber security, and whether any of our past predictions came true. Based on the headlines of this year and academic research, we discuss the outlook for 2017 and where we are likely to see flows and ebbs in the type of cyber security intrusions impacting us all. A Happy New Year to all of our Cyber Frontier listeners, and we look forward to having you with us for 2017!
The world is moving towards a fully encrypted internet, slowly but surely. Malicious adversaries are already taking advantage of this in the delivery of new malware payloads.
How badly are companies’ reputations impacted after a cybersecurity breach? See if you can measure for yourself by seeing how many of the below breaches you remember hearing about this year:
Yahoo rounded out a year’s worth of horrendous data breaches that show we are still the same glide path for similar headlines next year.
Law enforcement provided Yahoo in November 2016 with data files that a third party claimed was Yahoo user data. We analyzed this data with the assistance of outside forensic experts and found that it appears to be Yahoo user data. Based on further analysis of this data by the forensic experts, we believe an unauthorized third party, in August 2013, stole data associated with a broader set of user accounts, including yours. We have not been able to identify the intrusion associated with this theft. We believe this incident is likely distinct from the incident we disclosed on September 22, 2016.
Malware is changing, and changing fast. This was one of the best examples of how IoT devices can be used to do the same old thing in new and clever ways.
Jim’s Twitter: http://twitter.com/#!/jcollison
Contact Christian: firstname.lastname@example.org
Contact the show at email@example.com
Find this and other great Podcasts from the Average Guy Network at http://theaverageguy.tv