{"id":15229,"date":"2014-08-13T14:30:00","date_gmt":"2014-08-13T04:30:00","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=15229"},"modified":"2014-08-14T09:32:19","modified_gmt":"2014-08-13T23:32:19","slug":"cyberwrap-39","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyberwrap-39\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/a>This year\u2019s DEF CON<\/a> underground hacking conference in Las Vegas has left much to ponder about for cyber professionals the world over. The meet saw John McAfee<\/a> lambaste Google on privacy, Tesla Motors<\/a> offer a sacrificial Model S to the hacking hordes, and ‘smart’ thermostats<\/a> mimicking HAL 9000<\/a> from 2001: A Space Odyssey<\/em>. Dan Geer\u2019s policy proposals<\/a> were a particular highlight, and have since been labelled the 10 Commandments<\/a> of modern cybersecurity. A special thanks to the reporters who risked digital life and limb<\/a> to bring us the highlights from Vegas.<\/p>\n The recent theft of 1.2 billion<\/a> usernames and passwords by a Russian group shows that you do not need to be in a casino full of hackers to be vulnerable. With the identity of compromised sites still unknown, many have been scrambling to change their login details. While an important part of maintaining cyber hygiene, the effort might be for naught as it turns out your complex passwords aren\u2019t that much safer<\/a>.<\/p>\n If that news hasn\u2019t shaken your confidence in all things digital, a new non-for-profit venture<\/a> will help you transfer your greenbacks into cold hard cryptocurrency. The project aims to offer an international currency exchange to easily swap and send digital and hard currency alike\u00ad\u00ad\u2014a stellar idea if they can keep it secure. Ecuador is taking digital dollars a step further<\/a> by proposing a government-backed virtual currency, the U.S. Consumer Financial Protection Bureau<\/a> isn\u2019t quite as bullish on BitCoin.<\/p>\n A bit closer to home, Major General Steve Day, Deputy Director Cyber and Information Security at the Australian Signals Directorate shared his insights on cyberspace at the University of Canberra<\/a> recently. In presenting cyber as a vector, Day emphasised that it is what you can achieve through the medium that matters. While the vector, as a man-made space, requires IT professionals for its improvement, expansion and maintenance, the \u2018ends\u2019 side of the equation requires informed policymakers and operators to \u2018own its possibilities\u2019. While he made clear that the cyber threat to Australia is \u2018real, persistent, and present now\u2019, Day expressed optimism that Australia remained at the leading edge of thinking and acting on cyber issues and that government efforts were making an impact. The Australian Cyber Security Centre is looking to move into its new home on the banks of Lake Burley Griffin in December.<\/p>\n Tackling the divisive topic of cyber war head on, MAJGEN Day did take a firm stance that there would be no cyber war. Instead he suggested that cyber would be a feature of future wars, extending the battlefield. This assertion has proven true<\/a> in recent global turmoil, with FireEye researchers finding a distinct spike in malware traffic in the lead up to the crises in Ukraine and Gaza. \u2018We can see the digital equivalent of troops on the border\u2019, one threat analyst told the MIT Technology Review<\/em>. It appears that the US Defense Intelligence Agency<\/a> has taken that observation literally, commandeering social media to help identify who was responsible for shooting down MH17.<\/p>\n Kl\u00e9e Aiken is an analyst in\u00a0ASPI\u2019s\u00a0International Cyber Policy Centre<\/a>. Image courtesy of Flickr user Dioboss.<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":" This year\u2019s DEF CON underground hacking conference in Las Vegas has left much to ponder about for cyber professionals the world over. The meet saw John McAfee lambaste Google on privacy, Tesla Motors offer a …<\/p>\n","protected":false},"author":153,"featured_media":15236,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[915,391,169,95,728,914,163],"class_list":["post-15229","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-asd","tag-cyber","tag-cyber-crime","tag-cyber-security","tag-hacking","tag-internet-of-things","tag-russia"],"acf":[],"yoast_head":"\n