avc.com/2017/06/gettin…
"Russian malware communicates by leaving comments in Britney Spears's Instagram account"
boingboing.net/2017/06/07/wat…
Hacking wind turbine farms!
wired.com/story/wind-tur…
Hackers targeting nuclear facilities!
mobile.nytimes.com/2017/07/06/tec…
theguardian.com/commentisfree/…
"A smart fish tank left a casino vulnerable to hackers"
cnnmon.ie/2u9JZfG
theregister.co.uk/2017/07/29/us_…
Connected turbines & ransomware.
ft.com/content/81c010…
amp.cnn.com/cnn/2017/07/31…
STEP 2: Game Google results!
Malware. Encoded in DNA. That infects the computer running a gene-sequencer 😳
wired.com/story/malware-…
nytimes.com/2017/08/21/bus…
nbcnews.com/tech/security/…
SEC now.
wsj.com/articles/sec-d…
"... start treating data safety with the same seriousness we apply to airplane and automobile safety"
wsj.com/articles/shoul…
"Getting a heart transplant"
"Why???"
"Some hacker cloned my heart!" 🤦♂️
eurekalert.org/pub_releases/2…
"NotPetya ransomware cost Merck > $310 million"
cyberscoop.com/notpetya-ranso…
wsj.com/articles/surve…
bloomberg.com/news/articles/…
And humans clueless in the middle!
blogs.wsj.com/cio/2017/11/15…
Act 0: Everything becomes a "thing"
Act 1: Starts leaking data.
Ask not if a leaked data point is useful to a bad actor. Ask how.
Ask not if a bad actor will act on a leaked data point. Ask how.
Ask not of the intent. Ask of the outcome. And fix. And iterate. And fix...
🙏🙏🙏
"Cybersecurity Today Is Treated Like Accounting Before Enron"
nytimes.com/2018/01/08/opi…