Posts

Showing posts from May, 2025

UK businesses 'ignore free advice' to stop cyber attacks, GCHQ warns as M&S still reels... - LBC

As seen online:

“British businesses are not following “freely available” advice to thwart hackers, GCHQ's cyber security chief has said.”

— from UK businesses 'ignore free advice' to stop cyber attacks, GCHQ warns as M&S still reels... - LBC as of 25 May 2025

Financial Services Companies Most at Risk of DORA Non-Compliance | SC Media UK

As seen online:

“Around two months since the DORA regulation came into force, analysis of 250 businesses in nine financially regulated sub-sectors, looking at factors included FCA fines and complaints, ICO complaints and the number of cybersecurity incidents reported, and the number of firms registered to Cyber Essentials Plus, research has found a “severe gap in cybersecurity resilience.””

— from Financial Services Companies Most at Risk of DORA Non-Compliance | SC Media UK as of 24 May 2025

Stark Industries Solutions: An Iron Hammer in the Cloud – Krebs on Security

As seen online:

“Two weeks before Russia invaded Ukraine in February 2022, a large, mysterious new Internet hosting firm called Stark Industries Solutions materialized and quickly became the epicenter of massive distributed denial-of-service (DDoS) attacks on government and commercial targets in Ukraine and Europe.”

— from Stark Industries Solutions: An Iron Hammer in the Cloud – Krebs on Security as of 24 May 2025

Zero-Days in Edge Devices Become China's Cyber Warfare Tactic of Choice

Zero-Days in Edge Devices Become China's Cyber Warfare Tactic of Choice

Excerpt: ″The government of China has become considerably more proficient in exploiting zero-day vulnerabilities to achieve their espionage goals in the past five years, posing an alarming persistent threat to organizations throughout the world. Now, the country's nation-state actors are increasingly exploiting novel vulnerabilities in public-facing devices, notably edge appliances.″

Source: darkreading.com

Anthropic's new AI model turns to blackmail when engineers try to take it offline

Anthropic's new AI model turns to blackmail when engineers try to take it offline | TechCrunch

Excerpt: ″Anthropic’s newly launched Claude Opus 4 model frequently tries to blackmail developers when they threaten to replace it with a new AI system and give it sensitive information about the engineers responsible for the decision,″

Source: techcrunch.com

‘Rogue’ communication devices found on Chinese-made solar power inverters

‘Rogue’ communication devices found on Chinese-made solar power inverters | Utility Dive

Excerpt: ″U.S. officials have discovered undisclosed communication devices on the power inverters of some Chinese-manufactured solar panels, Reuters reported today based on anonymous sources within the federal government. ″

Source: utilitydive.com

Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack - Ars Technica

As seen online:

Excerpt: ″Hundreds of Windows and Linux computer models from virtually all hardware makers are vulnerable to a new attack that executes malicious firmware early in the boot-up sequence, a feat that allows infections that are nearly impossible to detect or remove using current defense mechanisms.″

Source: arstechnica.com

So it begins, the ongoing saga of cyberbadness

Cyberbadness is a handy word for "all the bad things that are done with, to, or by computers."


The world needs the word cyberdbadness because other words fall short. For example, a lot of cyberbadness is cybercrime, but not all the of the ways in which digital technology is misused and abused are crimes at all times or in all places. 

The term "cyberbadness" was coined by the network security expert Cameron Camp.

Used narrowly, cyberbadness can be defined as: "the misuse and abuse of digital technology for selfish and/or malicious ends." This ranges from malicious code that damages systems or steals information from them, all the way through email scams and online fraud to disinformation campaigns on social media. A broader use of cyberbadness encompasses the negative impact of computer systems on the environment, economics, and social justice.


The need for words to describe dirty deeds done with computers is documented with considerable humour by the pioneering researcher: Don Parker. During the first half of the 1970s he tracked reports of such deeds, but because his employer at the time would not let him use the term computer crime, he settled on computer abuse. See footnote 64 of the law journal article Advancing Accurate and Objective Cybercrime Metrics by Stephen Cobb which references a book worth borrowing: Crime by Computer by Don B. Parker (1976).