article thumbnail

Can Gather Change the Course of Internet History?

John Battelle's Searchblog

Within minutes, copies of my data were presented and organized in my Gather app. Of course, this is only the tip of the proverbial iceberg when it comes to what’s possible with data sets like these. In the meantime, Agarwal will be presenting his vision for Gather at P&G Signal this coming July 12th.

article thumbnail

Russia-linked APT28 targets govt bodies with fake NATO training docs

Security Affairs

Even today, less than half of the known antivirus engines are flagging the infection on VirusTotal , as observed by BleepingComputer: The APT28 group (aka Fancy Bear , Pawn Storm , Sofacy Group , Sednit , and STRONTIUM ) has been active since at least 2007 and it has targeted governments, militaries, and security organizations worldwide.

Military 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Catches of the Month: Phishing Scams for March 2022

IT Governance

The Ukrainian government and its military were targeted by DDoS (distributed denial-of-service) attacks, while a pro-Ukrainian group attacked the Belarusian railway system with ransomware after discovering that it was being used by Russia to transport tanks and weapons.

Phishing 144
article thumbnail

The U.S. Forest Service Presents: Winter Olympics

Unwritten Record

He and his team evoked pageantry and fanfare with live music, large statues, fireworks, symbolic decorations, the release of 2,000 pigeons, a military gun salute and 5,000 entertainers. The course seen in the footage of the women’s downhill race is still used today at Palisades Tahoe, aptly named Women’s Downhill.

article thumbnail

The Future of War (From Jan., 1993 to the Present)

John Battelle's Searchblog

This shift affects everything from the strategy that guides it to the individuals who oversee it (civilian political appointees) and the lawyers who advise them (civilians rather than military officers). This is virtual reality as a new way of knowledge: a new and terrible kind of transcendent military power. Why not purple dragons? (Ed:

Military 101
article thumbnail

Apple AirTag Bug Enables ‘Good Samaritan’ Attack

Krebs on Security

When scanned, an AirTag in Lost Mode will present a short message asking the finder to call the owner at at their specified phone number. military computers in history” was traced back to a USB flash drive left in the parking lot of a U.S. A USB stick with malware is very likely how U.S. Department of Defense facility.

Phishing 310
article thumbnail

Channel 4 Under Fire Over “Emergency News” Stunt to Promote Cyber Attack Drama

IT Governance

Unlike War of the Worlds , which garnered such a strong reaction in part because of the improbability of the story – an alien invasion – The Undeclared War presents something that we are being regularly warned about. Of course, the verisimilitude of the advert is exactly why Channel 4 chose this stunt.

Military 111