Dan Kaminsky

Type: Person
Name: Dan Kaminsky
First reported Sep 06 2014 - Updated Sep 06 2014 - 1 reports

It is not just celebrities who are losing their privacy

The theft and leaking of huge numbers of private images of various female celebrities last weekend, with Oscar-winning actor Jennifer Lawrence (above) the most prominent victim, is a thoroughly modern story.For one thing, the theft was enabled by cloud ... [Published Irish Times - Sep 06 2014]
First reported Sep 05 2014 - Updated Sep 05 2014 - 1 reports

Ritholtz's Reads: A Dinosaur, Some Elephants and Ponzi Schemes

Is it Friday already? Wherever does the time go? Here are my morning reads to help you through your commute:A Bearish Technical Case for Precious Metals ( Brandt )Shale Is Not a Ponzi ( FT Alphaville , Part II )Millennials Aren’t Changing Jobs as Much. ... [Published Bloomberg View - Sep 05 2014]
First reported Sep 05 2014 - Updated Sep 05 2014 - 2 reports

Summary: Seven Year Scratch

Sometimes life sneaks up on you. Often when I am introduced to new clients and professional contacts, it is as “Analyst and CEO of Securosis; he used to be at Gartner”. I am fully cognizant of the fact that not only is Gartner where I started my analyst ... [Published Security Bloggers Network - Sep 05 2014]
First reported Sep 04 2014 - Updated Sep 04 2014 - 1 reports

Dan Kaminsky ruminates on the celeb #hack, long, entertaining and worthwhile read, thanks @dakami

First reported Sep 04 2014 - Updated Sep 04 2014 - 3 reports

How to turn the tables on brute-force hackers

( thagoodiez )The celebrity photo hack underscores one of the Internet's most worrying dangers: Using weak passwords makes you really, really vulnerable. Weak passwords can be guessed by hackers who try every word in the dictionary until they strike paydirt. ... [Published Washington Post - Sep 04 2014]
First reported Sep 04 2014 - Updated Sep 04 2014 - 1 reports

Four short links: 4 September 2014

Makerspaces Coming to Libraries (Wired) — [W]hile I’m just as sentimental about the primacy of hard copy, the librarians aren’t. As they all tell me, their job is helping with access to knowledge—not all of which comes in codex form and much of which ... [Published O'Reilly Radar - Insight, analysis, and researc ... - Sep 04 2014]
First reported Sep 03 2014 - Updated Sep 04 2014 - 1 reports

White Ops' Dan Kaminsky to Keynote AT&T Cyber Security Conference

CEO Michael Tiffany Also Addressing Fraud in Digital Advertising at a Host of Key Industry Conferences ... [Published Marketwire - Breaking News Releases - Sep 03 2014]
First reported Sep 02 2014 - Updated Sep 03 2014 - 1 reports

FBI, Apple Probe Potential iCloud Hack

Celebrity Photo, Video Breaches Raise Cloud QuestionsThe U.S. Federal Bureau of Investigation and Apple are investigating the release of hundreds of celebrities' nude photographs and videos, which security researchers suspect is tied to a hack of iCloud, ... [Published Bank Info Security - Sep 02 2014]
First reported Sep 02 2014 - Updated Sep 02 2014 - 2 reports

FBI, Apple Probe Account Compromises

Celebrity Photo, Video Breaches Raise Cloud Questions(This story has been updated.)The U.S. Federal Bureau of Investigation and Apple are investigating the release of hundreds of celebrities' nude photographs and videos, which security researchers suspect ... [Published Bank Info Security - Sep 02 2014]
First reported Sep 02 2014 - Updated Sep 02 2014 - 1 reports

Apple, FBI probe nude celeb hacks

5 things you didn’t know about cloud backupThe Federal Bureau of Investigation and Apple are examining the theft of a large cache of naked celebrity photos.As El Reg reported yesterday, the photos depict Jennifer Lawrence, Kate Upton, Ariana Grande and ... [Published The Register - Sep 02 2014]
First reported Aug 18 2014 - Updated Aug 19 2014 - 1 reports

Judge agrees to delay Siveny trial

An Outgamie County judge approved a delay today for the trial of one of the suspects in a 2007 Greenville murder.Dianna Siveny is accused of killing Lara Plamann. Siveny's daughter Kandi, and 38-year-old Rosie Campbell also face charges in the case.Outagamie ... [Published WHBY AM 1150 - Aug 18 2014]
First reported May 12 2014 - Updated May 12 2014 - 2 reports

U-2 Spy-Plane-Inspired Radar Crash Was Sparked By Insufficient RAM

Having admitted that last week's air traffic control system crash was due to the fact that a U-2, Cold War-era, spy plane still in use by the U.S. military sparked a "glitch" in radar systems and grounded all west coast planes for over 45 minutes, ... [Published Zero Hedge - May 12 2014]

Quotes

"attackers are just way ahead. that has to change" said Dan Kaminsky , who has advised companies like Cisco and Microsoft on information security, in a blog post...

More Content

All (50) | News (31) | Reports (0) | Blogs (19) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Ethical hackers: ‘Without us, no one will prote... [Published Global News Canada - Sep 18 2014]
Users Of Comcast Public WiFi Now See Self-Promo... [Published Red Orbit - Sep 10 2014]
It is not just celebrities who are losing their... [Published Irish Times - Sep 06 2014]
Feedback Friday: iCloud Accounts of Celebrities... [Published Security Week - Sep 05 2014]
Ritholtz's Reads: A Dinosaur, Some Elephants an... [Published Bloomberg View - Sep 05 2014]
Summary: Seven Year Scratch [Published Security Bloggers Network - Sep 05 2014]
Summary: Seven Year Scratch [Published Securosis Highlights - Sep 05 2014]
Dan Kaminsky ruminates on the celeb #hack, long... [Published Team Cymru Internet Security News - Sep 04 2014]
How to turn the tables on brute-force hackers [Published Washington Post - Sep 04 2014]
How to turn the tables on brute-force hackers [Published Post Tech - Sep 04 2014]
How to turn the tables on brute-force hackers [Published Faster Forward - Sep 04 2014]
Four short links: 4 September 2014 [Published O'Reilly Radar - Insight, analysis, and researc ... - Sep 04 2014]
White Ops' Dan Kaminsky to Keynote AT&T Cyber S... [Published Marketwire - Breaking News Releases - Sep 03 2014]
Following iCloud hack, experts say enterprise d... [Published SearchCloudSecurity - Sep 03 2014]
FBI, Apple Probe Account Compromises [Published Bank Info Security - Sep 02 2014]
FBI, Apple Probe Potential iCloud Hack [Published Bank Info Security - Sep 02 2014]
Naked Celebrity Hack – How 4Chan Accessed iClou... [Published Inquisitr - Sep 02 2014]
Apple, FBI probe nude celeb hacks [Published The Register - Sep 02 2014]
Celebrity photo hacks spur online privacy fears [Published Washington Post - Sep 02 2014]
Naked celebrity hack: security experts focus on... [Published Guardian.co.uk - Sep 01 2014]
Judge agrees to delay Siveny trial [Published WHBY AM 1150 - Aug 18 2014]
Paladin and Grotech back White Ops [Published PE Hub Blog - Jun 24 2014]
EBay in hot seat for late detection of cyberatt... [Published Financial Post | Business » FP Tech Desk - May 22 2014]
Signal Sciences Raises $2 Million in Seed Fundi... [Published PRWeb - May 20 2014]
U-2 Spy-Plane-Inspired Radar Crash Was Sparked ... [Published Zero Hedge - May 12 2014]
Glitch In Air Traffic Control System Caused By ... [Published The Huffington Post | Full News Feed - May 12 2014]
This Day in Blogging History: Kaminsky on Bitco... [Published Boing Boing - May 05 2014]
U.S. government paying to undermine Internet se... [Published HispanicBusiness.com - Apr 30 2014]
Heartburn from Heartbleed forces wide-ranging r... [Published CNET News - Apr 24 2014]
The U.S. Needs to Stop Running Internet Securit... [Published Pacific Standard - Apr 22 2014]
1 2
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Summary: Seven Year Scratch [Published Security Bloggers Network - Sep 05 2014]
Sometimes life sneaks up on you. Often when I am introduced to new clients and professional contacts, it is as “Analyst and CEO of Securosis; he used to be at Gartner”. I am fully cognizant of the fact that not only is Gartner where I started my analyst ...
Summary: Seven Year Scratch [Published Securosis Highlights - Sep 05 2014]
Sometimes life sneaks up on you. Often when I am introduced to new clients and professional contacts, it is as “Analyst and CEO of Securosis; he used to be at Gartner”. I am fully cognizant of the fact that not only is Gartner where I started my analyst ...
Dan Kaminsky ruminates on the celeb #hack, long... [Published Team Cymru Internet Security News - Sep 04 2014]
2 retweets 1 favorites ...
How to turn the tables on brute-force hackers [Published Post Tech - Sep 04 2014]
( thagoodiez ) The celebrity photo hack underscores one of the Internet's most worrying dangers: Using weak passwords makes you really, really vulnerable. Weak passwords can be guessed by hackers who try every word in the dictionary until they strike ...
How to turn the tables on brute-force hackers [Published Faster Forward - Sep 04 2014]
( thagoodiez ) The celebrity photo hack underscores one of the Internet's most worrying dangers: Using weak passwords makes you really, really vulnerable. Weak passwords can be guessed by hackers who try every word in the dictionary until they strike ...
1 2 3 4
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.