Pages

Sunday, March 10, 2013




READ: Zero Day — A special report on the threat in cyberspace

The Threat in Cyberspace: To succeed in addressing risks in the digital universe, global leaders must understand one of the most complex, man-made creations on Earth: cyberspace.






(Matt McClain / FOR THE WASHINGTON POST)
Digital universe riddled with holes

Robert O’Harrow Jr. JUN 2, 2012

PART ONE | To defend themselves, governments, businesses and individuals will need to decipher one of the most complex, man-made environments on Earth: cyberspace.
Graphic: How a ‘fuzzing’ hack works
C-SPAN: Washington Post cybersecurity event
C-SPAN: Interview with Post reporter







(DAVID J. PHILLIP / ASSOCIATED PRESS)
Search engine reveals risks to machines

Robert O’Harrow Jr. JUN 3, 2012
PART TWO | A new search engine called Shodan finds industrial control systems connected to cyberspace and unsettles the balance of security online.

Graphic: How the Stuxnet worm worked
Poll: Computer habits that could pose risks
Q&A: 6 basic questions on cybersecurity
Graphic: ‘Fuzzing’ to find a zero day
Diane Rehm Show: Post reporter discusses series







(Matt McClain / FOR THE WASHINGTON POST)
Behind a framework, a cautionary cyber tale

Robert O’Harrow Jr. JUL 11, 2012

PART THREE | The Tridium company’s widely used technology is a marvel of modern connectivity, but after its networks were found to be vulnerable to hackers, it is moving to boost its security.
Hackers exploit ‘guest user’ account of software
DHS warns of hackers targeting Niagara software
Document: Homeland Security alert for Niagara
Graphic: The framework’s connectivity and risks
Document: Confidential security bulletin to users
Timeline: Key tech advances and notable hacks






Facebook and Twitter are prime sources for hackers. (Post)
Hackers exploit humans to gain access

Robert O’Harrow Jr. SEP 26

PART FOUR | The greatest threat to security in the Cyber Age comes from attacks known as “social engineering.”
Graphic: Using social media for cyberattacks
Hackers break into energy technology company






(Eric Schulzinger / Lockheed Martin via Reuters)
Hacking kits fuel cyberspace arms race

Robert O'Harrow Jr. NOV 13
PART FIVE | Tools make breaking into networks almost as easy for hackers as ordering food off a menu.
Graphic: Hacker menu
Washington Post Live cybersecurity conference









(Mark J. Terrill / AP)
PART SIX | “It might look to some people like a toy or game,” but program prepares government for digital attacks.
Graphic: Practicing for cyberwar










(Daniel Acker / BLOOMBERG)
PART SEVEN | A Post examination of cybersecurity has found that health care is among the most vulnerable industries.










Video: A new domain of war

JUN 2, 2012

For global leaders to address risks in the digital universe, they must understand cyberspace.












JUN 2, 2012

Explore some of the technological advances that led to cyberspace, along with notable hacks.



No comments:

Post a Comment