Friday 30 September 2016

Who Is China Going To Hack Next?

Eyes are once again on China for on going cyber-espoinage

Eyes are once again on China for on going cyber-espoinage

China has often come under fire for engaging in cyber warfare.

Earlier in 2016, Chinese cyber spies were accused of attacking and taking control of many of workstations that are installed at the Federal Deposit Insurance Corp.

In 2015, China was once again accused of a massive data breach inside the US Office of Personnel Management which brought forward the data of over 21 million people to the public.

And in 2014, China was prosecuted for cyber-espionage for economic gain when US Federal prosecutors blamed the People’s Liberation Army (PLA).

Even though China has denied all the allegations against them, there is no denying that cyber-warfare is on the rise and countries are taking an active part into it. The only question remains, who will be the next target?

Read more http://edition.cnn.com/2016/09/29/asia/china-cyber-spies-hacking/

The post Who Is China Going To Hack Next? appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/china-going-hack-next/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151157343120
via Zoe Hamilton

Hack An iPhone And Earn $1.5 Million Instantly

Hacking the new iPhone can make you rich instantly

Hacking the new iPhone can make you rich instantly

A private company that sells exploits has just announced a huge reward for exploiting Apple’s new iOS platform. For anyone who is able to find an exploit in the new OS, the company will pay $1.5 million in prize money.

Zerodium is behind this challenge. It is a company that purchases zero day vulnerabilities and exploits and then pays heavy rewards to anyone who is able to discover any known flaws or security loopholes within popular system software.

Zerodium is going to only pay for finding exploits in fully patched iPhones and iPads. They are encouraging researchers to find these exploits by putting large prizes on the board.

Read more details http://www.zdnet.com/article/you-can-now-earn-1-5-million-for-hacking-the-iphone/

The post Hack An iPhone And Earn $1.5 Million Instantly appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/hack-iphone-earn-1-5-million-instantly/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151153120740
via Zoe Hamilton

CISOs need to be more business-focused, says Publicis CISO

Information security leadership is about politics, getting a place at the top table and showing what security can do for the business, according to Publicis CISO Thom Langford

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400133/CISOs-need-to-be-more-business-focused-says-Publicis-CISO


from Tumblr http://zoehamilton671.tumblr.com/post/151150760130
via Zoe Hamilton

How to Steal an AI

How to Steal an AI
Researchers show how they can reverse engineer and even fully reconstruct someone else’s machine learning engine—using machine learning. The post How to Steal an AI appeared first on WIRED.

from WIRED https://www.wired.com/2016/09/how-to-steal-an-ai/
from Tumblr http://zoehamilton671.tumblr.com/post/151148997210
via Zoe Hamilton

Brexit has thrown ICO plans into flux, admits information commissioner

The ICO is working to ensure that the UK’s post-Brexit data protection law is progressive, stands up to scrutiny and provides stability, says information commissioner Elizabeth Denham

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400099/Brexit-has-thrown-ICO-plans-into-flux-admits-information-commissioner


from Tumblr http://zoehamilton671.tumblr.com/post/151141193630
via Zoe Hamilton

Thursday 29 September 2016

Emergency Alert Texts Are Getting a Much Needed Upgrade

Emergency Alert Texts Are Getting a Much Needed Upgrade
New FCC rules are going to make you hate those emergency alerts a whole lot less. The post Emergency Alert Texts Are Getting a Much Needed Upgrade appeared first on WIRED.

from WIRED https://www.wired.com/2016/09/emergency-alert-texts-getting-much-needed-upgrade/
from Tumblr http://zoehamilton671.tumblr.com/post/151121802620
via Zoe Hamilton

An Israeli Car Cybersecurity Company Has Raised $2.5 Million In Financing

A new powerful software will help protect autonomos vehicles from cyber crimes

A new powerful software will help protect autonomos vehicles from cyber crimes

A software called Carwall, created by Hod Hasharon company’s software can secure your car from cyber attacks by locking down all of its electronic control units.

A startup in in Israel known as Karamba Security has secured $2.5 million in financing. The company actively works to develop solutions for cars that are connected and autonomous in nature.

The new software will automatically secure autonomous vehicles by locking down all of its electronic control units. Everything that is performed out of the factory settings will be locked. This will prevent attackers from acquiring the control of the vehicle.

Read more details http://www.globes.co.il/en/article-israeli-car-cyber-security-co-karamba-raises-25m-1001155246

The post An Israeli Car Cybersecurity Company Has Raised $2.5 Million In Financing appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/israeli-car-cybersecurity-company-raised-2-5-million-financing/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151121732040
via Zoe Hamilton

Web Applications Can Now Be Locked With Ransomware

Any electronic device using web application can easily be hacked

Any electronic device using web application can easily be hacked

With web applications becoming more and more popular in all kinds of gadgets and applications, hackers have found a way to use Ransomware to lock them regardless of what device these applications are installed on.

In simple words, if you have a smart TV, a smart watch or any appliance that uses applications, it is under threat by hackers.

Cybercrime has become a norm nowdays thanks to emerging technology. Cybercrime is no longer only conducted through email, data breach or through mobile phones. Hackers can take control of your device if it is connected to the web.

Read more details http://www.forbes.com/sites/forbestechcouncil/2016/09/29/web-applications-are-the-achilles-heel-of-cybersecurity/#34dbb5271ec6

The post Web Applications Can Now Be Locked With Ransomware appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/web-applications-can-now-locked-ransomware/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151117391985
via Zoe Hamilton

A Cyber Security Firm Has Revealed Who Hacked Yahoo

A cybersecurity company has found out who hacked Yahoo

A cybersecurity company has found out who hacked Yahoo

A report released by the cybersecurity company  InfoArmor on Wednesday has revealed that 500 million accounts of Yahoo was hacked by an Eastern European criminal gang. Earlier it was suspected that it was a state sponsored group behind the act.

InfoArmor is quite confident that the act was performed by a criminal gang whereas Yahoo released a report stating that it was conducted by a nation state actor. InfoArmor provides big companies and businesses with protection against identity theft online. They also said that the data acquired by the hackers was sold of to at least 3 different clients which includes one state sponsored group.

Read more http://fortune.com/2016/09/29/yahoo-hacked-by-eastern-european-gang-cybersecurity-firm-says/

The post A Cyber Security Firm Has Revealed Who Hacked Yahoo appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/cyber-security-firm-revealed-hacked-yahoo/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151112673155
via Zoe Hamilton

NGOs challenge UK and US mass surveillance in human rights court

Privacy International, Liberty and the American Civil Liberties Union are among 10 human rights groups backing a landmark challenge to mass surveillance in the European Court of Human Rights

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400044/NGOs-challenge-UK-and-US-mass-surveillance-in-human-rights-court


from Tumblr http://zoehamilton671.tumblr.com/post/151106063725
via Zoe Hamilton

Breaches should be on the decline by now, says infosec veteran John Walker

A focus on the board, governance and compliance is distracting many infosec leaders from the real objective of security data, says John Walker

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400033/Breaches-should-be-on-the-decline-by-now-says-infosec-veteran-John-Walker


from Tumblr http://zoehamilton671.tumblr.com/post/151106063485
via Zoe Hamilton

Trust issues stifling digital economy growth, study shows

Businesses that have products and services based on trust have a significant opportunity to future-proof their business, but those who do not risk being side-lined, a study shows

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400012/Trust-issues-stifling-digital-economy-growth-study-shows


from Tumblr http://zoehamilton671.tumblr.com/post/151102380660
via Zoe Hamilton

Wednesday 28 September 2016

NHS Digital aims to put healthcare on firm cyber security footing

NHS Digital set to work closely with National Cyber Security Centre (NCSC) to boost healthcare sector cyber security capabilities

from ComputerWeekly: IT security http://www.computerweekly.com/news/450305158/NHS-Digital-aims-to-put-healthcare-on-firm-cyber-security-footing


from Tumblr http://zoehamilton671.tumblr.com/post/151055633215
via Zoe Hamilton

Infosecurity – the GCHQ way

Balancing privacy and security requires highly developed information security policies and, of the UK intelligence agencies, GCHQ has taken the lead.

from ComputerWeekly: IT security http://www.computerweekly.com/feature/Infosecurity-the-GCHQ-way


from Tumblr http://zoehamilton671.tumblr.com/post/151055632760
via Zoe Hamilton

UK National Cyber Security Centre set to launch

NCSC is due to launch officially on 1 October 2016 and will help the healthcare sector deliver consistent quality of data security

from ComputerWeekly: IT security http://www.computerweekly.com/news/450305144/UK-National-Cyber-Security-Centre-set-to-launch


from Tumblr http://zoehamilton671.tumblr.com/post/151050061685
via Zoe Hamilton

Tuesday 27 September 2016

Lax perimeter security exposes bank to hacker extortion attempt

Failure to follow standard network security best practice has exposed a Californian investment bank to cyber criminals’ demands

from ComputerWeekly: IT security http://www.computerweekly.com/news/450305054/Lax-perimeter-security-exposes-bank-to-hacker-extortion-attempt


from Tumblr http://zoehamilton671.tumblr.com/post/151010998040
via Zoe Hamilton

Yahoo breach underlines need for Security Serious Week

The recently disclosed Yahoo data breach shows that no business is immune, underlining the need to raise awareness and improve practices, say the organisers of Security Serious Week

from ComputerWeekly: IT security http://www.computerweekly.com/news/450305046/Yahoo-breach-underlines-need-for-Security-Serious-Week


from Tumblr http://zoehamilton671.tumblr.com/post/151010997540
via Zoe Hamilton

Tesla Responds to Chinese Hack With a Major Security Upgrade

Tesla Responds to Chinese Hack With a Major Security Upgrade
When researchers at the Chinese firm Tencent hacked a Tesla S, the carmaker pushed out a new security feature known as code signing to millions of vehicles. The post Tesla Responds to Chinese Hack With a Major Security Upgrade appeared first on WIRED.

from WIRED https://www.wired.com/2016/09/tesla-responds-chinese-hack-major-security-upgrade/
from Tumblr http://zoehamilton671.tumblr.com/post/151005389755
via Zoe Hamilton

Adrian Davis discusses the evolution of security in the age of IoT

Cloud computing and the internet of things will have a major impact on how security is implemented going forward.

from ComputerWeekly: IT security http://www.computerweekly.com/video/Adrian-Davis-discusses-the-evolution-of-security-in-the-age-of-IoT


from Tumblr http://zoehamilton671.tumblr.com/post/151004724205
via Zoe Hamilton

Monday 26 September 2016

Yahoo sued over data breach

Yahoo is facing a class action lawsuit that alleges that the internet firm showed a reckless disregard for the security of its users that resulted in a breach affecting half a billion people

from ComputerWeekly: IT security http://www.computerweekly.com/news/450304977/Yahoo-sued-over-data-breach


from Tumblr http://zoehamilton671.tumblr.com/post/150963808510
via Zoe Hamilton

Yahoo security still poor despite massive breach, claims Venafi

Yahoo is likely to have been a victim of its own encryption and security is still poor despite the huge breach that hit the company in 2014, according to security firm Venafi

from ComputerWeekly: IT security http://www.computerweekly.com/news/450304953/Yahoo-security-still-poor-despite-massive-breach-claims-Venafi


from Tumblr http://zoehamilton671.tumblr.com/post/150963808235
via Zoe Hamilton

Growth in UK smartphone market levels off

Deloitte’s annual study of UK consumer mobile habits reveals that more than 80% of Brits own or have access to a smartphone, and growth is levelling off

from ComputerWeekly: IT security http://www.computerweekly.com/news/450304949/Growth-in-UK-smartphone-market-levels-off


from Tumblr http://zoehamilton671.tumblr.com/post/150956539335
via Zoe Hamilton

Apple to fix backup security vulnerability in iOS 10

Apple is to issue a security update for a security vulnerability in iOS 10 that could give hackers access to passwords and other security data

from ComputerWeekly: IT security http://www.computerweekly.com/news/450304944/Apple-to-fix-backup-security-vulnerability-in-iOS-10


from Tumblr http://zoehamilton671.tumblr.com/post/150956538925
via Zoe Hamilton

Sunday 25 September 2016

Australia must take cyber security opportunity

Australia may never be able to create an IT industry like that in the US, but it can lead in cyber security

from ComputerWeekly: IT security http://www.computerweekly.com/news/450304779/Australia-must-take-cyber-security-opportunity


from Tumblr http://zoehamilton671.tumblr.com/post/150935293895
via Zoe Hamilton

Saturday 24 September 2016

Friday 23 September 2016

UK government partners with tech startups on cyber security

Applications are open to cyber security startups for the first of two cyber innovation centres to receive £50m over five years, as part of the government’s £1.9m National Cyber Security Programme

from ComputerWeekly: IT security http://www.computerweekly.com/news/450304850/UK-government-partners-with-tech-startups-on-cyber-security


from Tumblr http://zoehamilton671.tumblr.com/post/150813151465
via Zoe Hamilton

Yahoo under fire over data breach affecting 500 million users

Yahoo comes under fire for not detecting and notifying users sooner of the biggest breach of personal details to date

from ComputerWeekly: IT security http://www.computerweekly.com/news/450304842/Yahoo-under-fire-over-data-breach-affecting-500-million-users


from Tumblr http://zoehamilton671.tumblr.com/post/150813151270
via Zoe Hamilton

Thursday 22 September 2016

Hack Brief: Yahoo Looks Set to Confirm a Big, Old Data Breach

Hack Brief: Yahoo Looks Set to Confirm a Big, Old Data Breach
The company is reportedly about to admit that a four-year-old collection 200 million user accounts up for sale on the dark web is real, stolen data. The post Hack Brief: Yahoo Looks Set to Confirm a Big, Old Data Breach appeared first on WIRED.

from WIRED https://www.wired.com/2016/09/hack-brief-yahoo-looks-set-confirm-big-old-data-breach/
from Tumblr http://zoehamilton671.tumblr.com/post/150781170915
via Zoe Hamilton

Investigatory Powers Bill – the case for mass surveillance

As the Investigatory Powers Bill goes through its final stages in Parliament, a former GCHQ intelligence officer puts the case for the bulk surveillance powers contained in the legislation

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Investigatory-Powers-Bill-the-case-for-mass-surveillance


from Tumblr http://zoehamilton671.tumblr.com/post/150779134330
via Zoe Hamilton

Cyber attack aimed at destruction, says TV5Monde

TV5Monde counting the cost of not being adequately prepared for a cyber attacked that downed the network in 2015

from ComputerWeekly: IT security http://www.computerweekly.com/news/450304775/Cyber-attack-aimed-at-destruction-says-TV5Monde


from Tumblr http://zoehamilton671.tumblr.com/post/150766393575
via Zoe Hamilton

Many don’t test disaster recovery plans properly, survey finds

Nearly 40% of UK organisations do not test disaster recovery plans properly, mainly because of concerns about disruption to production operations

from ComputerWeekly: IT security http://www.computerweekly.com/news/450304720/Many-dont-test-disaster-recovery-plans-properly-survey-finds


from Tumblr http://zoehamilton671.tumblr.com/post/150762702980
via Zoe Hamilton

Wednesday 21 September 2016

London Capital Group improves service deployment with SDN

Online trading firm has revitalised its service delivery after switching a legacy physical network for VMware NSX SDN

from ComputerWeekly: IT security http://www.computerweekly.com/news/450304539/London-Capital-Group-improves-service-deployment-with-SDN


from Tumblr http://zoehamilton671.tumblr.com/post/150733334345
via Zoe Hamilton

Here’s The Most Secure Home Computer In The World

ORWL will protect you against hackers of any kind

ORWL will protect you against hackers of any kind

You have probably heard stories of how people can hack into systems and take control of everything or even acquire data. These may seem stories from movies, but if you look at the real world, things aren’t really any different.

Computer experts really can take control of your computer or smartphone in an instant if they want to.

Your home computer is extremely vulnerable to attacks. One man has set out to change this. George Orwell has crated the ORWL computer which is the most secure home computer in the world. He recently exceeded the goal of $25,000 in funding.

Read more details http://www.pcworld.com/article/3118264/security/orwl-pc-the-most-secure-home-computer-ever.html

The post Here’s The Most Secure Home Computer In The World appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/heres-secure-home-computer-world/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150732110230
via Zoe Hamilton

$81m cyber heist highlights gap between attacker and defenders, says Swift

Secure messaging service Swift was surprised by the gaps in banks’ cyber security practises highlighted by mega cyber heist, says CISO Alain Desausoi

from ComputerWeekly: IT security http://www.computerweekly.com/news/450304698/81m-cyber-heist-highlights-gap-between-attacker-and-defenders-says-Swift


from Tumblr http://zoehamilton671.tumblr.com/post/150729147175
via Zoe Hamilton

A New Chrome Update Will Help In Preventing Quantum Computer’s Cracking Encryption

Chrome update will help prevent quantum computers from taking control

Chrome update will help prevent quantum computers from taking control

Google has just released a new update for their Chrome browser that will help in preventing quantum computers from cracking any kind of encryption.

Now the tech giant is testing a new technology they are calling ‘CECPQ1’. It will be injected into some selected HTTPS sites which will give them stronger protection.

The chief security strategist at Venafi said that whenever the NSA urges the companies to move or get prepared, there is a good chance that something is coming our way.

That’s why big companies like Google are now testing new security protocols to protect home computers and smartphones from emerging threats.

Read more details http://www.informationsecuritybuzz.com/hacker-news/chrome-update-prevents-quantum-computers-cracking-encryption/

The post A New Chrome Update Will Help In Preventing Quantum Computer’s Cracking Encryption appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/new-chrome-update-will-help-preventing-quantum-computers-cracking-encryption/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150724721655
via Zoe Hamilton

Qadars Trojan gears up to target UK banks

Advanced Trojan that has been targeting different regions is now preparing to hit UK banks, according to IBM X-Force Research

from ComputerWeekly: IT security http://www.computerweekly.com/news/450304673/Qadars-Trojan-gears-up-to-target-UK-banks


from Tumblr http://zoehamilton671.tumblr.com/post/150722033875
via Zoe Hamilton

Tuesday 20 September 2016

Business warned not to be complacent about cyber security

Lloyds of London survey reveals just how badly some European firms are failing in terms of cyber security and low levels of awareness about the role of cyber insurance

from ComputerWeekly: IT security http://www.computerweekly.com/news/450304611/Business-warned-not-to-be-complacent-about-cyber-security


from Tumblr http://zoehamilton671.tumblr.com/post/150683597840
via Zoe Hamilton

Chrome Will Now Flag Non-HTTPS Logins And Credit Card Info ‘Not Secure’

Starting from January 2017, all https sites will be not secure

Starting from January 2017, all https sites will be not secure

Google is all set to lock down the web traffic that use encryption between the web server and browser.

As of January 2017, Google’s Chrome browser will start labeling sites with non-HTTPS sites that transmit credit card information and password as ‘not secure’.

Currently, all HTTP connections on Chrome are delivered through a neutral indicator. This means that before you can access a website, someone has the ability to change it before it even opens up for you.

Chrome is currently the most used browser in the world with at least 54% market share in desktop and mobile combined.

Read more details http://www.darkreading.com/vulnerabilities—threats/google-chrome-to-flag-non-https-logins-credit-card-info-not-secure/d/d-id/1326921

The post Chrome Will Now Flag Non-HTTPS Logins And Credit Card Info ‘Not Secure’ appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/chrome-will-now-flag-non-https-logins-credit-card-info-not-secure/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150679916585
via Zoe Hamilton

Cyber security a key feature of US rules on self-driving cars

The US government publishes a policy aimed at ensuring the safety of self-driving cars

from ComputerWeekly: IT security http://www.computerweekly.com/news/450304601/Cyber-security-a-key-feature-of-US-rules-on-self-driving-cars


from Tumblr http://zoehamilton671.tumblr.com/post/150676527665
via Zoe Hamilton

Monday 19 September 2016

A Surveillance Device From Police Reveals How They Are Able To Spy On Phones

The police is using a secret device to spy on your phone

The police is using a secret device to spy on your phone

The Harris Corp’s Stingray surveillance device is a long kept secret among the law enforcement agency for more than 15 years.

But a team of researchers were able to get there hands on manuals of the Harris device that spans over 200 pages that details how cellular surveillance is done.

The devices have been kept a secret from the public because they believe that if found out, criminals could use it in their favor.

This extremely powerful device can spy on modern phones without the notice of the user and can reveal almost everything they do on their phone.

Read more https://theintercept.com/2016/09/12/long-secret-stingray-manuals-detail-how-police-can-spy-on-phones/

The post A Surveillance Device From Police Reveals How They Are Able To Spy On Phones appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/surveillance-device-police-reveals-able-spy-phones/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150656095940
via Zoe Hamilton

How Police Trace Cellphones in IEDs Like the Ones in NYC

How Police Trace Cellphones in IEDs Like the Ones in NYC
As terror suspect Ahmad Khan Rahami may be learning, cellphones make convenient detonators—and convenient tracking devices. The post How Police Trace Cellphones in IEDs Like the Ones in NYC appeared first on WIRED.

from WIRED https://www.wired.com/2016/09/police-trace-cellphones-ieds-like-ones-nyc/
from Tumblr http://zoehamilton671.tumblr.com/post/150649773430
via Zoe Hamilton

Consumers trust banks more than government for biometric security

UK citizens think banks are the best organisations to provide biometric authentication for payments

from ComputerWeekly: IT security http://www.computerweekly.com/news/450304529/Consumers-trust-banks-more-than-government-for-biometric-security


from Tumblr http://zoehamilton671.tumblr.com/post/150636373095
via Zoe Hamilton

A 17 Year Old Kid Discovers A Way To Get Free Data On Phone

teen-hacks-phone-to-get-free-data

T-Mobile network exposed by teen for free phone data

Jacob Ajit, a 17 year old teen from Alexandria, Virginia has just hacked his way into getting free data for his phone.

When asked how he figured it all out, he casually said that he was just investigating how networks are configured until he found a little loophole. He discovered the loophole inside the T-Mobile network.

He knows that T-Mobile will quickly fill in the loophole, but in the meantime, he just wanted to share his findings with the community.

He figured out how to get free data while playing with a prepaid T-mobile service on his phone.

Read more http://motherboard.vice.com/read/a-teenage-hacker-figured-out-how-to-get-free-data-on-his-phone-t-mobile

The post A 17 Year Old Kid Discovers A Way To Get Free Data On Phone appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/17-year-old-kid-discovers-way-get-free-data-phone/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150635343305
via Zoe Hamilton

Sunday 18 September 2016

Alleged hacker Lauri Love can be extradited to the US, court rules

Westminster Magistrates’ Court has ruled that alleged hacker, Lauri Love, can be extradited to the US, where he could face a 99-year prison sentence

from ComputerWeekly: IT security http://www.computerweekly.com/news/450304389/Alleged-hacker-Lauri-Love-can-be-extradited-to-the-US-court-rules


from Tumblr http://zoehamilton671.tumblr.com/post/150592241515
via Zoe Hamilton

Friday 16 September 2016

FBI Will Soon Have The Tools To Legally Hack Anyone They Want

FBI can legally hack your PC, Laptop or Phone From December 1

FBI can legally hack your PC, Laptop or Phone From December 1

When a malware is released to invade a system, even the smallest changes made to it can have huge impacts that are unpredictable in nature.

Considering this, the Justice Department is extending government hacking with a vast expansion in mind. Under these new rules, the FBI will have complete authority to use malware and hack anyone they want.

This new rule is now formally known as Rule 41 of the Federal Rules of Criminal Procedure. It will allow the government to hack millions and millions of computers with a single warrant.

If it is not challenged, the law will go in effect on December 1.

Read more https://www.wired.com/2016/09/government-will-soon-able-legally-hack-anyone/

The post FBI Will Soon Have The Tools To Legally Hack Anyone They Want appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/fbi-will-soon-tools-legally-hack-anyone-want/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150514017820
via Zoe Hamilton

Someone Is Exposing The Power Of DDoS On Large Companies

The DDoS hacker is undetectable

The DDoS hacker is undetectable

One of the easiest ways to take down an entire network off the internet is through using the distributed denial-of-service attack, most commonly known as the DDoS.

Like it’s name suggests, this attack was designed from keeping real users from getting to specific website.

Basically, with a DDoS attack, the culprit aims to put in so much data into a site that it stops working. Hackers have been performing these attacks regularly on many different websites.

Now someone is taking it a step further by taking large companies of the internet one by one. These attacks are similar in nature but undetectable.

Read more details https://www.schneier.com/blog/archives/2016/09/someone_is_lear.html

The post Someone Is Exposing The Power Of DDoS On Large Companies appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/someone-exposing-power-ddos-large-companies/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150509715970
via Zoe Hamilton

More Files Related To Serena Williams and Simone Biles Released By Russian Hackers

Hackers also called athletes taking illegal drugs

Hackers also called athletes taking illegal drugs

The Anti Doping Agency (Wada) has been condemning Russian Hackers for releasing files that are confidential medical reports of US Olympic athletes.

Athletes who were caught in the fire include Serena Williams, Venus Williams and Simone Biles.

The files were released by a hackers group that goes by the name Fancy Bears. After they had released the medical files, it was found out that Ms Biles was taking medicine for attention deficit hyperactivity disorder.

The hackers also accused the star olympics athlete for taking illegal psycho-stimulant, to which the star said she was always following the rules.

She had taken permission to take prescription medicine that are banned on Wada list.

Read more details http://www.bbc.com/news/world-37352326

The post More Files Related To Serena Williams and Simone Biles Released By Russian Hackers appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/files-related-serena-williams-simone-biles-released-russian-hackers/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150505296400
via Zoe Hamilton

FBI Director Urges Everyone To Cover Their Webcam

Cover your cam from hackers taking control of it

Cover your cam from hackers taking control of it

The FBI director on Wednesday defended the idea of putting tape over personal laptop’s webcam. He claims that this is a necessary security step and should be taken as a common sense by everyone one.

Director James Comey said that one of the sensible things you should do is put tape on your webcam whether it’s on your laptop or your PC.  He said this during a conference at Center for Strategic and International Studies.

He also said that there is a reason why so many computer screen these days come with webcams that have a small lid on them.

Read more http://thehill.com/policy/national-security/295933-fbi-director-cover-up-your-webcam

The post FBI Director Urges Everyone To Cover Their Webcam appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/fbi-director-urges-everyone-cover-webcam/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150500638465
via Zoe Hamilton

Lauri Love - my battle with extradition

Lauri Love, a 31 year old electrical engineering student, from Suffolk, has been accused of hacking into government computers in 3 US states

from ComputerWeekly: IT security http://www.computerweekly.com/video/Lauri-Love-my-battle-with-extradition


from Tumblr http://zoehamilton671.tumblr.com/post/150494048275
via Zoe Hamilton

Alleged hacker Lauri Love can be extradited to the US says court

Court rules that alleged hacker, Lauri Love, can be extradited to the US.

from ComputerWeekly: IT security http://www.computerweekly.com/news/450304389/Lauri-Love-verdict


from Tumblr http://zoehamilton671.tumblr.com/post/150494048710
via Zoe Hamilton

New Cybersecurity Protection Services Coming To Enterprise Clients Through LIFARS and BlackRidge Technology Partnership

BlackRidge Technology, which is a provider of identity based cybersecurity and network has just announced its partnership with LIFARS, a incident response and cybersecurity intelligence firm based in New-York.

The partnership will allow the companies to provide a completely redesigned and new ecosystem for expanding reach and visibility. They will then offer clients a new level of protection against cyber crimes that will help them protect insider threats and deploy any emergency measures needed on demand.

Both companies are already providing solutions to enterprise clients to help protect against rising threat of cyber crimes. Their partnership will open new horizons for enterprise clients who are constantly under threat.

Read more http://www.prweb.com/releases/2016/09/prweb13664756.htm

The post New Cybersecurity Protection Services Coming To Enterprise Clients Through LIFARS and BlackRidge Technology Partnership appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/new-cybersecurity-protection-services-coming-to-enterprise-clients-through-lifars-and-blackridge-technology-partnership/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150491058725
via Zoe Hamilton

Lauri Love: the student accused of hacking the US

How did a brilliant but fragile teenager from a rural English town end up facing life imprisonment in the US? Computer Weekly speaks to Lauri Love

from ComputerWeekly: IT security http://www.computerweekly.com/feature/Lauri-Love-the-student-accused-of-hacking-the-US


from Tumblr http://zoehamilton671.tumblr.com/post/150486666275
via Zoe Hamilton

Thursday 15 September 2016

How the FBI Could Have Hacked the San Bernardino Shooter’s iPhone

How the FBI Could Have Hacked the San Bernardino Shooter’s iPhone
The technique hints that the FBI may have been more interested in setting a precedent by forcing Apple’s cooperation than in accessing a terrorist’s data. The post How the FBI Could Have Hacked the San Bernardino Shooter’s iPhone appeared first on WIRED.

from WIRED https://www.wired.com/2016/09/heres-fbi-hacked-san-bernardino-shooters-iphone/
from Tumblr http://zoehamilton671.tumblr.com/post/150458712625
via Zoe Hamilton

A Good American: a personal take on mass surveillance

Director Friedrich Moser explains what he has learned from making a groundbreaking documentary about the work of NSA whistleblower Bill Binney

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/A-Good-American-a-personal-take-on-mass-surveillance


from Tumblr http://zoehamilton671.tumblr.com/post/150451261205
via Zoe Hamilton

Cabinet Office role in information security in government not clear

The UK government has work to do to reduce complexity of security policies, according to the NAO

from ComputerWeekly: IT security http://www.computerweekly.com/news/450304291/Cabinet-Office-role-is-information-security-in-government-not-clear


from Tumblr http://zoehamilton671.tumblr.com/post/150448029140
via Zoe Hamilton

Is The Future Of Cyber Crime Bleak?

If not taken care of, cyber crime will become extremely common.

If not taken care of, cyber crime will become extremely common.

According to National Crime Agency (NCA) Cybercrime Assessment 2016 report, nearly 53 percent of all crimes that were committed in 2015 were cyber crimes.

Mr. Cameron Brown, an independant cyber defence advisor had a say into this matter. He has been conducting different researches into the emerging trends of cyber crimes. He warns that opportunities to earn through the act of cyber crimes will rise especially in the income bands that are low.

If not controlled, cybercrime will be a source of income that is less risky and more yielding. This is an alarming state where the cybersecurity agencies should be focusing right now to prevent an outbreak later.

Read more details http://raconteur.net/business/is-future-cyber-crime-a-nightmare-scenario

The post Is The Future Of Cyber Crime Bleak? appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/is-the-future-of-cyber-crime-bleak/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150445967605
via Zoe Hamilton

The Role Of Cyber Crime Dogs In Helping To Bust Child Predators & Terrorists

Cyber crime dogs are being trained to tackle criminals on the internet

Cyber crime dogs are being trained to tackle criminals on the internet

There is a reason why dogs are used for catching criminals. Their nose is pretty much a god given wonder that can smell without limits. Now cybercrime divisions of different parts of the world are training dogs to bust child predators and terrorists.

The latest set of cybercrime dogs are now being trained to sniff out chemical compounds that are unique to electronic storage devices such as memory cards, flash drives, cellphones and laptops.

If trained properly they could help differentiate between the acquittal and conviction cases of sex trafficking, terrorism and child pornography.

Read more details http://iheartdogs.com/cyber-crime-dogs-sniff-out-electronics-to-bust-terrorist-child-predators/

The post The Role Of Cyber Crime Dogs In Helping To Bust Child Predators & Terrorists appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/the-role-of-cyber-crime-dogs-in-helping-to-bust-child-predators-terrorists/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150442012675
via Zoe Hamilton

USB That Can Literally Kill A Computer Within Seconds Is Now On Sale

The super cyber crime USB stick can kill your PC in an instant.

The super cyber crime USB stick can kill your PC in an instant.

Last year, a Russian Researcher was able to develop a USB stick that could instantly destroy sensitive components of a computer as soon as it was plugged in.

But that was only a concept based prototype. Now some guy out of nowhere has actually developed a full scale USB stick that is built upon the work of Dark Purple, the Russian researcher.

This USB is now openly being sold by a Hong Kong based technology manufacturer by the name USB Kill 2.0. It is capable of shutting down any computer within seconds and is being retailed for $49.95.

Read more details http://thehackernews.com/2016/09/usb-kill-computer.html

The post USB That Can Literally Kill A Computer Within Seconds Is Now On Sale appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/usb-that-can-literally-kill-a-computer-within-seconds-is-now-on-sale/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150439591735
via Zoe Hamilton

Donald Trump Jr. Couldn’t Hold Back Trolling Hillary Clinton By Visiting Her Super Secure IT Provider

People were not exactly happy with IT company troll picture of Trump Jr.

People were not exactly happy with IT company troll picture of Trump Jr.

Rep. Jason Chaffetz on Tuesday made a request to probe in the circumstances that have been recently surrounding the deletion of email archives of Hillary Clinton. He sent letters to the U.S. Attorney for the District of Columbia and Platte River Networks, the company that is handling IT for Clinton.

An interview was recently conducted by the FBI and was released later. It seems that the staff at the IT company had an oops moment just days before the conference went live between the two parties.

Donald Trump Jr. took the opportunity to visit the IT company and took a photo for #millenialsfortrump ad.

Read more details http://twitchy.com/brettt-3136/2016/09/07/donald-trump-jr-trolls-hillary-clinton-with-a-visit-to-her-super-secure-it-provider/

The post Donald Trump Jr. Couldn’t Hold Back Trolling Hillary Clinton By Visiting Her Super Secure IT Provider appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/donald-trump-jr-couldnt-hold-back-trolling-hillary-clinton-by-visiting-her-super-secure-it-provider/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150437261835
via Zoe Hamilton

Wednesday 14 September 2016

Anti-Doping Agency Attack Shows Russian Hackers Getting Bolder

Anti-Doping Agency Attack Shows Russian Hackers Getting Bolder
The attack on the World Anti-Doping Agency, following the DNC hack, signals Russian hackers emerging from the shadows to brazenly flaunt their work. The post Anti-Doping Agency Attack Shows Russian Hackers Getting Bolder appeared first on WIRED.

from WIRED https://www.wired.com/2016/09/anti-doping-agency-attack-shows-russian-hackers-getting-bolder/
from Tumblr http://zoehamilton671.tumblr.com/post/150414111415
via Zoe Hamilton

Here’s How Google Is Stopping Aspiring ISIS Recruits

giggityGoogle is using its tech incubator ‘Jigsaw’, which was recently renamed from Google Ideas to develop a new program that the company hopes can use a combination of search advertisement algorithms and YouTube platform to find and target aspiring ISIS recruits.

They will then dissuade them from joining the group.

A new phase of the program will be launched later this month that will place advertisements alongwith results for keywords and phrases that match search criteria of people who are attracted to ISIS.

The ads will be placed in both English and Arabic language on YouTube and other Google owned platforms.

Read more https://www.wired.com/2016/09/googles-clever-plan-stop-aspiring-isis-recruits/

The post Here’s How Google Is Stopping Aspiring ISIS Recruits appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/heres-how-google-is-stopping-aspiring-isis-recruits/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150406836925
via Zoe Hamilton

Important Interview Tips For Security Analyst Job Seekers

secrurity jobsAre you seeking a position as a Security Analyst in a company? You may have a lot of questions. This post aims to help you with the hardest part of getting the job; the interview.

First things first, the IT world is currently facing threats that are increasingly tough to deal with and the need of talent is on the rise. This means that most companies are now digging for candidates who are able to demonstrate top notch skills with critical thinking as the most important part of their skill set.

Start With Knowing More Than The Basics

The best way to impress your interviewer is to know more than just the basics. Since companies are demanding high end talent, they are probably looking for someone who can go beyond the basics. For example, if you can learn the inside outs of your field, such as current technology, its usage and implementation, you may be able to easily impress the interviewer.

If you are completely new to the field of cybersecurity and security analyst, it is imperative that you start reading some material on the world of IT security.

Have A Number Of Projects Ready Under Your Belt

Experts have said this time and time again. Cybersecurity is all about showing your practical skills. So make sure your resume has plenty of projects listed down. Whether you did something voluntarily or during your classroom lab adventures, you need to show your interviewers that you have been busy with practical stuff.

Be Clear and Concise

Communication is the number one thing when it comes to being a security analyst. You will be working alongside a team of other IT professionals where you will have to communicate a lot. You should naturally be a team player.

Show your interviewer how well you can do when you work with a good team. Show them examples of your previous projects you completed with a group of other people.

Last but not the least, have a mindset of an explorer and adventurer. You must keep learning on new stuff if you want to excel in the cyber security world. Keep in mind both the defensive and offensive technologies are evolving day after day and it is getting tougher and tougher to fight back cybercrime. Learn new technologies and list them down in your resume so your interviewers can know that you are willing to spend time learning new things.

The post Important Interview Tips For Security Analyst Job Seekers appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/important-interview-tips-for-security-analyst-job-seekers/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150406837080
via Zoe Hamilton

Man Gets A New Trial In New Jersey Over Cyberbullying Case

Man suicides after roommate cyber bullied him constantly

Man suicides after roommate cyber bullied him constantly

A New Jersey appeals court has thrown out a conviction of a ex Rutgers University student who posted a video of his roommate kissing another man, causing him to commit suicide.

Dharun Ravi was originally convicted in 2012 on 15 different charges including bias intimidation. He also led a group of other students to spy on his roommate in 2010.

After being constantly bullied, Clementi, 18, decided to commit suicide. He jumped off George Washington Bridge a week later from the incident and instantly died from his injuries. The death of the student started a national debate over cyber bullying.

Read more details http://www.metro.us/news/new-jersey-man-gets-new-trial-in-clementi-cyberbullying-case/jZzpii—IL6JdSF25qYQAegir0Ic2g/

The post Man Gets A New Trial In New Jersey Over Cyberbullying Case appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/man-gets-a-new-trial-in-new-jersey-over-cyberbullying-case/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150406835940
via Zoe Hamilton

Hackers Get Past Denuvo Once Again

Pirates are winning again by cracking anti piracy systems

Pirates are winning again by cracking anti piracy systems

The ongoing battle against piracy is once again in trouble. The all mighty Denuvo DRM system has once again been cracked.

The group CONSPIR4CY or CPY has just released the full crack version of Bethesda’s DOOM. The game was using Denuvo DRM to protect it self from piracy.

Previously, CPY was also responsible for cracking tripple A title Rise of Tomb Raider which was also using Denuvo anti crack measures.

CPY has proven that even Denuvo cannot protect digital IPs any more. Game developers are spending thousands of dollars to sign contract with a system that is now losing its foothold quickly.

Read more details http://zerolives.com/article/n7MQOfdh/release-group-cpy-releases-doom-denuvo-crack

The post Hackers Get Past Denuvo Once Again appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/hackers-get-past-denuvo-once-again/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150406835450
via Zoe Hamilton

Your Email Could Be Carrying A New Kind Of Potentially Dangerous Virus

Midco warns of a potential ransomware virus

Midco warns of a potential ransomware virus

Midco has just warned its users that a new virus is circling around in emails that could be potentially dangerous for their computers.

The statement released by the company read that people with @midco.net email addresses may contain a ransomware trojan virus that is currently not being detectable by most anti virus software.

The users are urged to detect the virus themselves by looking at the subject line of the email. If the subject line reads anything like ”Vigor2820”, they are urged to not open the email and immediately delete it.

This malware gets the users to decrypt their files and then takes over the computer.

Read more details http://www.ifallsjournal.com/news/local/midco-warns-customers-of-potential-computer-virus/article_fa745abd-dc29-5ef3-bc7f-3f5396cd9015.html

The post Your Email Could Be Carrying A New Kind Of Potentially Dangerous Virus appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/your-email-could-be-carrying-a-new-kind-of-potentially-dangerous-virus/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150406835155
via Zoe Hamilton

A New Virus Can Infect Your MAC Any Where Any Time

Mac system security is under threat

Mac system security is under threat

A virus or malware is capable of shutting down entire systems if powerful enough. Now a new virus, created by the co-founder of Apple Computers. In an interview, he said that he may have written a harmful computer software that could take down a MAC anywhere, anytime.

He also confirmed that he destroyed the virus before it could be used anywhere.

But even then Apple customers are continuously facing more and more threats from hackers and viruses that are specifically designed to attack Macs in an attempt to defame the systems created by Apple.

Read more details http://www.ruut.ug/articles/shocking-this-virus-created-by-steve-wozniak-could-spread-itself-on-all-mac-computers

The post A New Virus Can Infect Your MAC Any Where Any Time appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/a-new-virus-can-infect-your-mac-any-where-any-time/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150406835275
via Zoe Hamilton

Network Management Systems Have Become A Treasure Map For Hackers

Are network management systems a big treasure mine for hackers?

Are network management systems a big treasure mine for hackers?

According to a new research by Rapid7, Network Management Systems have become easier to attack than previously anticipated.

Rapid7, the firm behind the Metasploit penetration testing tool is now warning that vulnerabilities in the systems that are used to manage network elements such as printers, routers and servers give the hackers a treasure map like value. From there on, the hackers are able to find enterprise targets easily. For example, a printer attached on this network may be printing payroll slips will easily reveal the information of employees.

The new research done by the company explores how the attacks are being taken out.

Read more details http://www.theregister.co.uk/2016/09/07/natwork_magement_vulns/

The post Network Management Systems Have Become A Treasure Map For Hackers appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/network-management-systems-have-become-a-treasure-map-for-hackers/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150406834750
via Zoe Hamilton

A New Report Suggest There Is Inadequate Corporate Information Protection

Government too frightened to fight cyber criminals

Government too frightened to fight cyber criminals

Reports of cyber crimes have become a very common thing these days. Around a billion dollars, if not trillion, are reportedly swept off yearly through cyber crimes.

Figures this large has become a very important and scary deal for businesses and governments. But still there has been no real action taken against the problem. It seems the government and other agencies that deal with cybercrime are too frightened to confront the real problem that is intractable and beyond what they can do about it.

This is mostly due to the unability to capture and maintain accurate data. Cybercrimes are hard to trace and that is causing the problem.

Read more details http://www.hstoday.us/columns/critical-issues-in-national-cybersecurity/blog/cyber-crime-trends-trends-point-to-inadequate-corporate-information-protection/739c711dfdb79e0d83bab68e9e2a9619.html

The post A New Report Suggest There Is Inadequate Corporate Information Protection appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/a-new-report-suggest-there-is-inadequate-corporate-information-protection/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150406537255
via Zoe Hamilton

GMAIL IS DOWN!!! Have They Been Hacked?

gmail-downGMAIL HACKED?

Nobody knows why gmail is down right now, but they assure us they are working on it.

You can read more here http://www.express.co.uk/life-style/science-technology/710652/Gmail-Not-Working-Google-Email-Down-UK-United-States-Outage

You can also check your app dashboard here

The post GMAIL IS DOWN!!! Have They Been Hacked? appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/gmail-is-down-have-they-been-hacked/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/150406536960
via Zoe Hamilton