US Republican party shuns electronic ballots at open convention. From Politico. The 2016 Republican presidential campaign has been the definition of an instantaneous digital race, complete with micro-targeted Facebook ads, Twitter tirades and ephemeral Snapchat videos. But the biggest moment of the entire GOP contest, at the party’s national convention in Cleveland, is shaping up to be a decidedly low-tech affair.
- ISIS hacking division release names and personal details of dozens of American soldiers urging lone wolf attacks. From Daily Mail. ISIS hackers have released the names and personal details of dozens of American military personnel urging supporters to assassinate them. The ‘hit list’ which was published on social media, claimed to include the details of American servicemen who had operated drones responsible for the coalition airstrikes.
- Iranian Hacker Arrested for Stealing American Airlines Air Miles Worth $260,000. From Softpedia. Miami police revealed details about a criminal case from 2015 during which officers arrested an Iranian national studying in the US for stealing reward air miles from American Airlines customers worth $260,000. The suspect’s name is Milad Avadzavani, a former Florida International University student, who was arrested last year and is preparing to face trial this summer.
Cybersecurity Professionals Are Using Misdirection To Combat Hacking. From Motherboard. Today, there are many honeypot security programs available with which cybersecurity teams can deploy to draw hackers’ attention wherever they wish it to go. As programming has progressed, honeypots and honeynets have become increasingly etherealized; several virtual machines may all be hosted on a single physical box. But the honeypot approach has its drawbacks. Scalability is the biggest concern–virtual or not, someone has to keep an eye on these systems and corral hackers, and IT teams typically have their hands full managing the regular networks.
- What is a firewall? From Palo Alto Networks. A firewall is a network security device that grants or rejects network access to traffic flows between an untrusted zone (e.g., the Internet) and a trusted zone (e.g., a private or corporate network). The firewall acts as the demarcation point or “traffic cop” in the network, as all communication should flow through it and it is where traffic is granted or rejected access. Firewalls enforce access controls through a positive control model, which states that only traffic defined in the firewall policy is allowed onto the network; all other traffic is denied (known as “default deny”).