Monday 31 October 2016

It’s Finally Legally To Hack Your Own Devices (Even Your Car)

It’s Finally Legally To Hack Your Own Devices (Even Your Car)
An exemption in a decade-old anti-hacking statute has finally kicked in, and could unleash a new bounty of security research. The post It’s Finally Legally To Hack Your Own Devices (Even Your Car) appeared first on WIRED.

from WIRED https://www.wired.com/2016/10/hacking-car-pacemaker-toaster-just-became-legal/
from Tumblr http://zoehamilton671.tumblr.com/post/152580858060
via Zoe Hamilton

ICO prepares for post-Brexit GDPR

The Information Commissioner’s Office is to publish a revised timeline for the UK implementing the EU’s General Data Protection Regulation after Brexit

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402036/ICO-prepares-for-post-Brexit-GDPR


from Tumblr http://zoehamilton671.tumblr.com/post/152561209200
via Zoe Hamilton

How software-defined networking can secure critical systems

SDN promises to bring the efficiency gains achieved in server virtualisation to networking, while also boosting security

from ComputerWeekly: IT security http://www.computerweekly.com/news/450402016/How-software-defined-networking-can-secure-critical-systems


from Tumblr http://zoehamilton671.tumblr.com/post/152559668920
via Zoe Hamilton

Self-sovereign identity on the block – ideal or no deal?

There’s a rumour out there in the IT and business world that blockchains could be the magic elixir when it comes to users’ full control and power over their own digital identities. But is that really so?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Self-sovereign-identity-on-the-block-ideal-or-no-deal


from Tumblr http://zoehamilton671.tumblr.com/post/152552958615
via Zoe Hamilton

The cyber threats lurking within every company

Insider threats have been around for a long time, but it is only recently that people have begun to acknowledge the true danger they pose

from ComputerWeekly: IT security http://www.computerweekly.com/feature/The-cyber-threats-lurking-within-every-company


from Tumblr http://zoehamilton671.tumblr.com/post/152552958345
via Zoe Hamilton

Friday 28 October 2016

United Utilities protects field engineering deployment with AirWatch

United Utilities deploys mobile device management software AirWatch to secure Samsung devices running a SAP workforce management app

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401925/United-Utilities-protects-field-engineering-deployment-with-AirWatch


from Tumblr http://zoehamilton671.tumblr.com/post/152426199230
via Zoe Hamilton

Red Cross data breach shows security is still not a priority

The Australian Red Cross Blood Service has responded quickly to a breach of 550,000 donor details, but security commentators say the incident shows security is still not a priority for many organisations

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401910/Red-Cross-data-breach-shows-security-is-still-not-a-priority


from Tumblr http://zoehamilton671.tumblr.com/post/152426199010
via Zoe Hamilton

Apple iCloud and Gmail hacker gets 18 months in jail

A US man is given a sentence of 18 months in jail for hacking into celebrity iCloud and Gmail accounts after investigators failed to find a link with the leak of celebrity nude photos online in 2014

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401905/Apple-iCloud-and-Gmail-hacker-gets-18-months-in-jail


from Tumblr http://zoehamilton671.tumblr.com/post/152426198795
via Zoe Hamilton

Thursday 27 October 2016

Dyn reveals details of complex and sophisticated IoT botnet attack

DNS services provider Dyn, which was the victim of a large-scale DDoS attack perpetrated by an IoT botnet earlier in October, discusses details of its experience

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401857/Dyn-reveals-details-of-complex-and-sophisticated-IoT-botnet-attack


from Tumblr http://zoehamilton671.tumblr.com/post/152382997790
via Zoe Hamilton

Information security set for steep trajectory, says (ISC)2

By helping to create a thriving, diverse and open information security community, (ISC)2 hopes to ensure a steep rise for the profession

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401850/Information-security-set-for-steep-trajectory-says-ISC2


from Tumblr http://zoehamilton671.tumblr.com/post/152382997660
via Zoe Hamilton

Schneider Electric praised for positive response to ICS security flaw

Schneider Electric has patched a security flaw that highlights the vulnerability of industrial control systems to cyber attack

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401831/Schneider-Electric-praised-for-positive-response-to-ICS-security-flaw


from Tumblr http://zoehamilton671.tumblr.com/post/152382997465
via Zoe Hamilton

Wednesday 26 October 2016

US Treasury tells banks to provide more cyber attack information

The US government is calling on financial institutions to share more cyber attack information as concerns grow about the sector’s vulnerability

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401745/US-Treasury-tells-banks-to-provide-more-cyber-attack-information


from Tumblr http://zoehamilton671.tumblr.com/post/152338653235
via Zoe Hamilton

SAP steps up data privacy in Europe

SAP guarantees technicians outside of Europe will not be able to access companies’ sensitive personnel and other records

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401728/SAP-steps-up-data-privacy-in-Europe


from Tumblr http://zoehamilton671.tumblr.com/post/152330235800
via Zoe Hamilton

Tuesday 25 October 2016

Malaysian insurer partners IT supplier to tailor cyber security policies

Partnership is in response to requests from AIG customers for a more comprehensive risk management approach to cyber insurance

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401655/Malaysian-insurer-partners-IT-supplier-to-tailor-cyber-security-policies


from Tumblr http://zoehamilton671.tumblr.com/post/152317197440
via Zoe Hamilton

DevOps largely failing to improve security, study shows

Despite the promise of improved application security, DevOps is failing to deliver due to some key barriers, an HPE study shows

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401645/DevOps-largely-failing-to-improve-security-study-shows


from Tumblr http://zoehamilton671.tumblr.com/post/152295762855
via Zoe Hamilton

Monday 24 October 2016

Dyn DDoS attack highlights vulnerability of global internet infrastructure

Last week’s DDoS attack on DNS firm Dyn has highlighted both the vulnerability of the world’s internet infrastructure, and the dangers of leaving internet of things devices unsecured

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401576/Dyn-DDoS-attack-highlights-vulnerability-of-global-internet-infrastructure


from Tumblr http://zoehamilton671.tumblr.com/post/152251447495
via Zoe Hamilton

In the digital era, customer identity is key

Identity is vital for presenting a consistent customer relationship across digital channels, but not everyone in all organisations understands this shift, according to identity veteran Ian Glazer

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401590/In-the-digital-era-customer-identity-is-key


from Tumblr http://zoehamilton671.tumblr.com/post/152251447150
via Zoe Hamilton

More than 100 MPs ask Obama to halt extradition bid against Lauri Love

UK MPs across all parties call for US President to save activist from extradition to the US on hacking charges on humanitarian grounds

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401567/More-than-100-MPs-ask-Obama-to-halt-extradition-bid-against-Lauri-Love


from Tumblr http://zoehamilton671.tumblr.com/post/152244092130
via Zoe Hamilton

UK National Cyber Security Centre a positive development, says CNI expert

There needs to be greater understanding of cyber threats facing business, and the UK’s new National Cyber Security Centre is a step in the right direction, says CNI expert Barrie Millett

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401575/UK-National-Cyber-Security-Centre-a-positive-development-says-CNI-expert


from Tumblr http://zoehamilton671.tumblr.com/post/152244092055
via Zoe Hamilton

Over 100 MPs sign letter to Obama asking him to drop extradition against alleged hacker Lauri Love

MPs across all parties call for President Barack Obama to save activist Lauri Love from extradition to the US on hacking charges on humanitarian grounds.

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401567/Over-100-MPs-sign-letter-to-Obama-asking-him-to-drop-extradition-against-alleged-hacker-Lauri-Love


from Tumblr http://zoehamilton671.tumblr.com/post/152243977685
via Zoe Hamilton

Friday 21 October 2016

No endgame for cyber security, says Mikko Hypponen

Two of the most valuable lessons in cyber security are to know your enemy and not to rely on users to be secure, according to industry veteran Mikko Hypponen

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401510/No-endgame-for-cyber-security-says-Mikko-Hypponen


from Tumblr http://zoehamilton671.tumblr.com/post/152119912095
via Zoe Hamilton

Major DDoS attack on Dyn causes internet disruption

DNS provider Dyn experiences a large DDoS attack, causing disruption to online services

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401515/Major-DDoS-attack-on-Dyn-causes-internet-disruption


from Tumblr http://zoehamilton671.tumblr.com/post/152115775785
via Zoe Hamilton

Many firms failing on crucial customer experience in digital era

Only through collaboration between all customer-facing parts of a business can it deliver the customer experience that is crucial to survival in the digital era, according to CXP Group consultant Nicole Dufft

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401502/Many-firms-failing-on-crucial-customer-experience-in-digital-era


from Tumblr http://zoehamilton671.tumblr.com/post/152115773315
via Zoe Hamilton

Anonymous’ Most Notorious Hacker Is Back, and He’s Gone Legit

Anonymous’ Most Notorious Hacker Is Back, and He’s Gone Legit
Hector “Sabu” Monsegur has returned to the hacking scene—this time on the right side of the law. The post Anonymous’ Most Notorious Hacker Is Back, and He’s Gone Legit appeared first on WIRED.

from WIRED https://www.wired.com/2016/10/anonymous-notorious-hacker-back-hes-gone-legit/
from Tumblr http://zoehamilton671.tumblr.com/post/152110586900
via Zoe Hamilton

UK first to bring surveillance under rule of law, says former GCHQ director

Former GCHQ head David Omand says the UK will be the first country in Europe to legislate to regulate digital intelligence and put it under judicial supervision with judicial review

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401482/UK-first-to-bring-surveillance-under-rule-of-law-says-former-GCHQ-director


from Tumblr http://zoehamilton671.tumblr.com/post/152109158150
via Zoe Hamilton

Thursday 20 October 2016

Lessons to be learned from attempted $1bn bank heist

Analysis of an attack aimed at stealing $1bn reveals important lessons for cyber defenders, says BAE Systems head of threat intelligence Adrian Nish

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401419/Lessons-to-be-learned-from-attempted-1bn-bank-heist


from Tumblr http://zoehamilton671.tumblr.com/post/152072150080
via Zoe Hamilton

Getting the balance right now the big data genie is out the bottle

Big data is a fact of life, but getting the balance right when it comes to privacy is crucial to avoid litigation and fines

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Getting-the-balance-right-now-the-big-data-genie-is-out-the-bottle


from Tumblr http://zoehamilton671.tumblr.com/post/152065018655
via Zoe Hamilton

Armed forces minister wants military recruiters to "think different" to attract cyber security pros

Armed Forces minister Mike Penning says military must rethink how it recruits trainees to attract people with the cyber security skills the country needs to protect itself

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401409/Armed-forces-urged-to-rethink-recruitment-process-to-build-out-cyber-security-skills-workforce


from Tumblr http://zoehamilton671.tumblr.com/post/152065018365
via Zoe Hamilton

Wednesday 19 October 2016

Asean countries deepen joint efforts against global cyber threats

Asean Cyber Capacity Programme (ACCP) launched in Singapore to fund cyber security efforts across the region.

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401315/Asean-countries-deepen-joint-efforts-against-global-cyber-threats


from Tumblr http://zoehamilton671.tumblr.com/post/152056495665
via Zoe Hamilton

Ireland to follow UK in setting up national cyber security centre

The Republic of Ireland plans to set up a national cyber security centre and education programme to improve the security of critical infrastructure, businesses and citizens

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401339/Ireland-to-follow-UK-in-setting-up-national-cyber-security-centre


from Tumblr http://zoehamilton671.tumblr.com/post/152030606270
via Zoe Hamilton

Snowden: the IT analyst turned whistleblower who exposed mass surveillance

Oliver Stone’s biopic on Edward Snowden reaches the heart of the ethical crisis posed by mass surveillance for the state and ordinary citizens

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401277/Snowden-the-IT-analyst-turned-whistleblower-who-exposed-mass-surveillance


from Tumblr http://zoehamilton671.tumblr.com/post/152027397535
via Zoe Hamilton

Knowing the business is key to security, says consultant

Security must be based on real-world business needs and practices as traditional perimeter-based security is no longer working, says independent security consultant Brian Honan

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401324/Knowing-the-business-is-key-to-security-says-consultant


from Tumblr http://zoehamilton671.tumblr.com/post/152027397200
via Zoe Hamilton

Imagine if Donald Trump Controlled the NSA

Imagine if Donald Trump Controlled the NSA
Trump’s presidential candidacy raises the question: How tyrant-proof is the world’s most powerful surveillance agency? The post Imagine if Donald Trump Controlled the NSA appeared first on WIRED.

from WIRED https://www.wired.com/2016/10/imagine-donald-trump-controlled-nsa/
from Tumblr http://zoehamilton671.tumblr.com/post/152021557720
via Zoe Hamilton

Information security needs to cast recruitment net wider, says panel

Companies struggling to fill info sec roles should focus on finding people who can do what they need, not on qualifications, according to a security industry panel

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401311/Information-security-needs-to-cast-recruitment-net-wider-says-panel


from Tumblr http://zoehamilton671.tumblr.com/post/152017864600
via Zoe Hamilton

Tuesday 18 October 2016

Saving Lauri Love: activists plan their next move

An eclectic bunch of activists, charity workers and reformed hackers spent a rainy Sunday afternoon plotting their next move in a campaign to save Lauri Love from extradition to the US on hacking charges

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401264/Saving-Lauri-Love-activists-plan-their-next-move


from Tumblr http://zoehamilton671.tumblr.com/post/151984401365
via Zoe Hamilton

Cyber security is about big team efforts, says CNI expert

Cyber security requires a team approach, based on a good understanding of the threat, to achieve effective resilience, according to Barrie Millett of the Cyber Rescue Alliance

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401266/Cyber-security-is-about-big-team-efforts-says-CNI-expert


from Tumblr http://zoehamilton671.tumblr.com/post/151984401165
via Zoe Hamilton

Most businesses vulnerable to cyber attacks through firmware, study shows

Company culture and overall attitude to security is a major contribution to vulnerability to cyber attack through firmware, a study by Isaca has revealed

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401249/Most-businesses-vulnerable-to-cyber-attacks-through-firmware-study-shows


from Tumblr http://zoehamilton671.tumblr.com/post/151980788255
via Zoe Hamilton

Businesses underprepared for GDPR, study shows

Lack of consumer and regulatory understanding, combined with low technical and cultural preparedness, represents a major threat to revenue and brand value, according to a Symantec state of privacy report

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401248/Businesses-underprepared-for-GDPR-study-shows


from Tumblr http://zoehamilton671.tumblr.com/post/151974062175
via Zoe Hamilton

Monday 17 October 2016

Intelligence agencies collected personal data unlawfully for a decade, says IPT

UK intelligence agencies have been collecting communications data on the population without adequate oversight for a decade, according to the Investigatory Powers Tribunal

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401216/Intelligence-agencies-collected-personal-data-unlawfully-for-a-decade-says-IPT


from Tumblr http://zoehamilton671.tumblr.com/post/151938776525
via Zoe Hamilton

Business and GDPR to drive consumer identity projects

Business demand for consumer identity management capability is growing to enable new business models, improve customer engagement and ensure General Data Protection Regulation compliance, says KuppingerCole

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401204/Business-and-GDPR-to-drive-consumer-identity-projects


from Tumblr http://zoehamilton671.tumblr.com/post/151934866300
via Zoe Hamilton

UK firms could face £122bn in data breach fines in 2018

The PCI Security Standards Council is urging firms to act now to avoid exponentially increased penalties under new EU data protection regulations

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401190/UK-firms-could-face-122bn-in-data-breach-fines-in-2018


from Tumblr http://zoehamilton671.tumblr.com/post/151925717655
via Zoe Hamilton

Friday 14 October 2016

Firms urged to automate security certificate backup after Globalsign blackout

Online firms are being urged to reduce their dependency on single certificate authorities by automating backup processes

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401082/Firms-urged-to-automate-security-certificate-backup-after-Globalsign-blackout


from Tumblr http://zoehamilton671.tumblr.com/post/151796160880
via Zoe Hamilton

Want to Know Julian Assange’s Endgame? He Told You A Decade Ago

Want to Know Julian Assange’s Endgame? He Told You A Decade Ago
Ten years ago, Julian Assange argued that it wasn’t leaks that would kill political parties, but the fear of them. The post Want to Know Julian Assange’s Endgame? He Told You A Decade Ago appeared first on WIRED.

from WIRED https://www.wired.com/2016/10/want-know-julian-assanges-endgame-told-decade-ago/
from Tumblr http://zoehamilton671.tumblr.com/post/151795843735
via Zoe Hamilton

Retail websites riddled with security holes, researchers warn

Retailers urged to improve the security of their online stores amid a series of discoveries of cyber criminal campaigns to exploit vulnerabilities in retail websites

from ComputerWeekly: IT security http://www.computerweekly.com/news/450401065/Retail-websites-riddled-with-security-holes-researchers-warn


from Tumblr http://zoehamilton671.tumblr.com/post/151787982210
via Zoe Hamilton

Thursday 13 October 2016

Lloyds Bank launches technologies to improve and secure customer services

Lloyds Bank is investing in the latest technologies to provide customers with convenient and secure banking services

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400998/Lloyds-Bank-launches-technologies-to-improve-and-secure-customer-services


from Tumblr http://zoehamilton671.tumblr.com/post/151751882055
via Zoe Hamilton

Almost two-thirds of US office workers unaware of ransomware threat

Nearly half of ransomware attacks are aimed at office workers, but almost two-thirds of those polled in the US are unaware of the threat

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400992/Almost-two-thirds-of-US-office-workers-unaware-of-ransomware-threat


from Tumblr http://zoehamilton671.tumblr.com/post/151745655380
via Zoe Hamilton

Wednesday 12 October 2016

Thousands of significant cyber incidents hit Australian organisations

Australian Cyber Security Centre report reveals growing threat, with energy, banking and finance, and communications sectors targeted most often

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400934/Thousands-of-significant-cyber-incidents-hit-Australian-organisations


from Tumblr http://zoehamilton671.tumblr.com/post/151739956290
via Zoe Hamilton

Government to name and shame departments failing to secure email

The NCSC is piloting various cyber security intiatives with government departments such as Dmarc and other email security measures, and plans to name and shame those which fail to comply

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400935/Government-to-name-and-shame-departments-failing-to-secure-email


from Tumblr http://zoehamilton671.tumblr.com/post/151710629280
via Zoe Hamilton

Can The U.S Election Really Be Hacked?

Experts believe US elections cannot be hacked because they're mostly offline

Experts believe US elections cannot be hacked because they’re mostly offline

Russian hacking U.S in the upcoming presidential election became a hot topic during the debate on Sunday night. It raised a question: can the U.S elections really be hacked?

Experts had a say on a national level. They believe it cannot happen. But there is still enough evidence that leaves us with this question.

According to most cybersecurity professionals, the U.S systems are under no threat from hackers. This is because the systems are too decentralized and most of them operate offline.

In order to be effectively hacked, the systems need to be online. But since they aren’t, there is little to no threat.

Read more details http://www.usatoday.com/story/tech/news/2016/10/10/could-us-election-hacked/91866334/

The post Can The U.S Election Really Be Hacked? appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/can-u-s-election-really-hacked/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151710493395
via Zoe Hamilton

A Hacking Group Vandalized Buzzfeed’s Posts

hacking-group-vandalizes-buzzfeed

OurMine hacking group hacks Buzzfeed and warns them not to run fake stories

A few posts of Buzzfeed news website were vandalized by a hacking group known as ‘Ourmine’. The hack came as a result when buzzfeed posted a news article identifying a teenage hacker that the site claimed to be part of the hacking group.

OurMine denied the report and said that the person was just a fan of their hacking group. But then they decided to hack Buzzfeed and changed many of its posts into warnings.

All posts that were changed read:

Hacked by OurMine team, dont share fake news about us again, we have your database. Next time it will be public. Don’t **** with OurMine again.

Read more details http://www.theverge.com/2016/10/5/13172430/buzzfeed-hacked-by-ourmine-after-exposing-member

The post A Hacking Group Vandalized Buzzfeed’s Posts appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/hacking-group-vandalized-buzzfeeds-posts/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151708491155
via Zoe Hamilton

Government failing to prepare UK for robotics and AI

A report produced by the Science and Technology Committee has warned that the UK is fundamentally unprepared for the changes that will come from robotics and artificial intelligence

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400921/Government-failing-to-prepare-UK-for-robotics-and-AI


from Tumblr http://zoehamilton671.tumblr.com/post/151700645865
via Zoe Hamilton

G7 sets financial sector cyber defence guidelines as attacks grow

G7 countries have agreed cyber security guidelines in response to concerns about the safety of interconnected global financial systems that are increasingly coming under attack, according to Symantec

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400914/G7-sets-financial-sector-cyber-defence-guidelines-as-attacks-grow


from Tumblr http://zoehamilton671.tumblr.com/post/151700119590
via Zoe Hamilton

Gary McKinnon: Why Lauri Love should be spared the nightmare of extradition

Computer activist Lauri Love should be spared a life sentence in a US jail, says former hacker Gary McKinnon

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Gary-McKinnon-Why-Lauri-Love-should-be-spared-the-nightmare-of-extradition


from Tumblr http://zoehamilton671.tumblr.com/post/151697936750
via Zoe Hamilton

Tuesday 11 October 2016

Signal, the Cypherpunk App of Choice, Adds Disappearing Messages

Signal, the Cypherpunk App of Choice, Adds Disappearing Messages
One of the crypto world’s most highly regarded messaging apps finally gains a Snapchat-like feature for cleaning up your conversation history. The post Signal, the Cypherpunk App of Choice, Adds Disappearing Messages appeared first on WIRED.

from WIRED https://www.wired.com/2016/10/signal-cypherpunk-app-choice-adds-disappearing-messages/
from Tumblr http://zoehamilton671.tumblr.com/post/151674494700
via Zoe Hamilton

Middle East CISO Council CEO warns of global cyber security storm

Cyber security issues will be a major theme at this month’s GITEX Technology Week 2016 conference in Dubai

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400829/Middle-East-CISO-Council-CEO-warns-of-global-cyber-security-storm


from Tumblr http://zoehamilton671.tumblr.com/post/151664617315
via Zoe Hamilton

Security Think Tank: Defend against phishing with training, technology and reporting

What are the most effective types of security controls and user training approaches to dealing with phishing?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Defend-against-phishing-with-training-technology-and-reporting


from Tumblr http://zoehamilton671.tumblr.com/post/151661695005
via Zoe Hamilton

Three-quarters of UK policing websites lack secure encryption

A quarter of UK policing websites have secure foundations, but half have room for improvement, and the remaining quarter are in need of serious and urgent improvement, according to the Centre for Public Safety

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400830/Three-quarters-of-UK-policing-websites-lack-secure-encryption


from Tumblr http://zoehamilton671.tumblr.com/post/151654685140
via Zoe Hamilton

Monday 10 October 2016

What To Do If You Find Out Your iPhone Is Being Hacked?

iPhone can be easily restored to factory settings to protect against hacks

iPhone can be easily restored to factory settings to protect against hacks

Smartphone hacking is on the rise and many people report their phones getting hacked. Whether you use an iPhone or any Android powered phone, you can easily be hacked.

If you detect that your phone is being accessed without your authorization, you should take necessary actions immediately. Below is a guide explaining what to do in case your iPhone is being hacked.

Start by diagnosing the problem:

  1. First of all, backup all your data. In order to learn how to completely backup your iPhone, follow this iPhone, iPad or iPod Touch backup guide.
  2. Remove the SIM card you are using and install a backup SIM (any number you do not regularly use). It is better if you use a prepaid SIM card for this purpose.
  3. Start the phone and leave it on for a while and see if your phone is still being spammed with text messages. If the messages stop appearing, then the SIM you were using is being targeted and your phone is safe.
  4. If however weird messages continue to keep coming on the new number, you need to logout of messages. To do this, simply go to your phone settings, access accounts and log out your Apple ID.
  5. Now proceed to registering new Apple ID and use the phone with the new ID. If the messages or other activity goes away, your Apple ID is being targeted or spammed.
  6. Turn off all your data. This includes 3G, 4G and wireless. If your phone is still being spammed with unauthorized activity, your phone is compromised and must be cleaned.

Here are possible solutions to the problem:

If you find out that your number is being spammed, contact your carrier and ask them to block the phone number(s) that are spamming the SIM.

If your Apple ID is the culprit, block the iMessage number that is being used to spam your phone. Here’s a good way to block calls, messages or FaceTime calls on an iPhone.

If your phone is compromised, you will have to delete all the data and reset it to factory settings. You can follow this detailed guide on fully backing up your data for resetting the phone back to factory settings.

If you are feeling adventurous or revengeful, there are hacking services that can hack the hacker for you. Try contacting with your query to admin@hackerdemy.com and they will assist you with the process.

Further more, having some hacking experience can also help you detect where the cyber attacks are coming from. You can become a hacker by following our guide to becoming a professional hacker.

The post What To Do If You Find Out Your iPhone Is Being Hacked? appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/find-iphone-hacked/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151633454940
via Zoe Hamilton

NSA Chief Says U.S Needs To Upgrade To Fight Against Cyber Threats

USA needs to change its strategy to protect against cyber warfare

USA needs to change its strategy to protect against cyber warfare

NSA Chief outlined that U.S needs to upgrade their cyber security systems to fight rising cyber threats.

He said that the United States will need to rethink its strategy and use a combination of strategies to fight back the rising risks of foreign countries attacking our computing networks.

He gave this speech during a visit to a packed room at the Kennedy School on Wednesday.

He also outlined the daunting challenges of defeating cyber threats of foreign countries and independant cyber criminals.

In order to confront cyber attacks, he said that the U.S needs better network protection.

Read more details http://news.harvard.edu/gazette/story/2016/10/u-s-needs-upgrade-against-cyber-threats-commander-says/

The post NSA Chief Says U.S Needs To Upgrade To Fight Against Cyber Threats appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/nsa-chief-says-u-s-needs-upgrade-fight-cyber-threats/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151626120195
via Zoe Hamilton

Kaspersky And Secucloud Partner To Combat Cyber Attacks 

Secucloud security solutions will be more secure thanks to Kaspersky technologies

Secucloud security solutions will be more secure thanks to Kaspersky technologies

Secucloud has just created a new Elastic Cloud Security System. It is a cloud based security framework that will use Kaspersky Lab’s high end technologies. This will enable better security for Secucloud customers.

The company has combined modules like the multi-analyzer threat protection, packet analyzer, SAND SSL Scan and its IABS engine with the powerful technologies created by Kaspersky to offer enterprise grade security solutions.

The company previously has enjoyed a reputation for distributing and use enterprise technologies like APT protection to fight back malware effectively. With Kaspersky’s help, their technology will be even more powerful.

Read more details http://www.itnewsafrica.com/2016/10/seculoud-partners-with-kaspersky-to-combat-cyber-threats/

The post Kaspersky And Secucloud Partner To Combat Cyber Attacks  appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/kaspersky-secucloud-partner-combat-cyber-attacks/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151619073790
via Zoe Hamilton

Kaspersky And Secucloud Partner To Combat Cyber Attacks 

Secucloud security solutions will be more secure thanks to Kaspersky technologies

Secucloud security solutions will be more secure thanks to Kaspersky technologies

Secucloud has just created a new Elastic Cloud Security System. It is a cloud based security framework that will use Kaspersky Lab’s high end technologies. This will enable better security for Secucloud customers.

The company has combined modules like the multi-analyzer threat protection, packet analyzer, SAND SSL Scan and its IABS engine with the powerful technologies created by Kaspersky to offer enterprise grade security solutions.

The company previously has enjoyed a reputation for distributing and use enterprise technologies like APT protection to fight back malware effectively. With Kaspersky’s help, their technology will be even more powerful.

Read more details http://www.itnewsafrica.com/2016/10/seculoud-partners-with-kaspersky-to-combat-cyber-threats/

The post Kaspersky And Secucloud Partner To Combat Cyber Attacks  appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/kaspersky-secucloud-partner-combat-cyber-attacks/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151619073790
via Zoe Hamilton

Security Think Tank: Phishing: protect, educate and limit damage

What are the most effective types of security controls and end user training approaches to dealing with phishing?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Phishing-protect-educate-and-limit-damage


from Tumblr http://zoehamilton671.tumblr.com/post/151617275470
via Zoe Hamilton

Singapore: a nation united on its digital future

Singapore is setting itself to be a leader in the digital age, with a reorganised government department the protagonist

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400519/Singapore-a-nation-united-on-its-digital-future


from Tumblr http://zoehamilton671.tumblr.com/post/151614686825
via Zoe Hamilton

Smartwatches banned from UK Cabinet as EC plans IoT security standards

The EC is planning a security certification scheme for internet of things devices as the UK Cabinet bans smartwatches amid heightened fears of cyber espionage

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400714/Smartwatches-banned-from-UK-cabinet-as-EC-plans-IoT-security-standards


from Tumblr http://zoehamilton671.tumblr.com/post/151606714185
via Zoe Hamilton

Security Think Tank: Four key elements to defending against phishing attacks

What are the most effective types of security controls and end user training approaches to dealing with phishing?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Four-key-elements-to-defending-against-phishing-attacks


from Tumblr http://zoehamilton671.tumblr.com/post/151605045760
via Zoe Hamilton

Friday 7 October 2016

Security industry failing users, says behaviour expert

The information security community is failing to educate users in a way that helps then understand cyber threats and change their behaviour, according to consultant Jessica Barker

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400621/Security-industry-failing-users-says-behaviour-expert


from Tumblr http://zoehamilton671.tumblr.com/post/151472740125
via Zoe Hamilton

London police charge third member of ATM hacking gang

London police arrest and charge a third man suspected of being involved in a series of ATM thefts across the UK in 2014 using malware to bypass security controls

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400607/London-police-charge-third-member-of-ATM-hacking-gang


from Tumblr http://zoehamilton671.tumblr.com/post/151466426805
via Zoe Hamilton

Thursday 6 October 2016

The FBI Wants To Crack Another Dead Terrorist’s Locked iPhone

The FBI Wants To Crack Another Dead Terrorist’s Locked iPhone
Minnesota knife attacker Dahir Adan’s iPhone remains locked—just like the one that sparked a feud between the Bureau and Apple earlier this year. The post The FBI Wants To Crack Another Dead Terrorist’s Locked iPhone appeared first on WIRED.

from WIRED https://www.wired.com/2016/10/fbi-wants-crack-another-dead-terrorists-locked-iphone/
from Tumblr http://zoehamilton671.tumblr.com/post/151456882615
via Zoe Hamilton

What are the best programming languages to learn if you want to be a hacker?

Become the ultimate hacker by starting with these programming languages

Become the ultimate hacker by starting with these programming languages

If you ask us, we’d say it depends.

Learning a programming language will always somehow help you out in the future. Nearly every complex cybersecurity job requires some sort of professional knowledge about a programming language.

To start with hacking however, create a Live USB with Debian, Kali, Ubuntu, RedHat or Linux distribution. Start by learning shell scripting first. The best way to do so is to learn on Kali Linux 2.0 on your Live-USB preferably connected to a MacBook because it has many tools pre installed that will keep you away from installing additional features.

While learning shell scripting, visit https://www.learnshell.org/ because it has a built in console that you can try to code on while you are learning.

Next you should go for Python. Python will allow you to make complex algorithms using only a couple of commands. And also it is one of the best languages for beginners.

Visit https://www.learnpython.org/ to take on python 2.x tutorial. This is made by the same people who made shell one. Python 2.x is great because it has a number of different libraries. Python may be a bit old school for 2016, but it is still very worth it. You can use Python to:

  • Connect via telnet to any network device
  • Query SNMP objects that are on a network device
  • Connect via SSH to any device on the network
  • update, query or populate any MySQL database
  • Build customized artwork packets and then analyze them
  • Create apps to automate daily networking tasks that include collecting information, testing clients and making network discovery.

Python is also pretty good due to its cross platform nature. It can be easily used on Linux, Windows or OS X.

Here is another website to check if you want to learn python http://www.diveintopython3.net/.

If you visit this website, you need to make sure that you have a command prompt running on the side so you can work and experiment while learning at the same time.

Using the sites mentioned above, you can easily learn to launch a DoS attack or do SQL Injections.

Once you are ready, head over to the popular http://www.hackthissite.org/ and start putting your skills to the test.

Additionally, as a hacker you should have the knowledge to create websites. For that you should learn html, css and javascript. This will greatly help you in hacking websites because most of them are coded using these languages.

Plus you can always use your browser’s ‘view code’ feature to see the code that is powering the website. There’s always a loophole somewhere in the code.

Last but not the least, go for c++. It isn’t exactly beginner friendly but it definitely is the best one to learn when you become an advanced user.

To learn additional skills, head over to WonderHowTo website.

The post What are the best programming languages to learn if you want to be a hacker? appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/best-programming-languages-learn-want-hacker/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151444712710
via Zoe Hamilton

Security Company Warns Current Voting Systems Vulnerable to threats

Security vulnerabilities will lead to disastrous security threats

Security vulnerabilities will lead to disastrous security threats

A computer security company is warning that Pennsylvania’s voting systems are vulnerable to cyber threats.

According to Carbon Black Inc., a company based in Massachussets, Pennsylvania may pose a really big security risk in during the 2016 U.S. Presidential Election.

The weak spot as detected by the company are the electronic voting machines that are lacking a paper trail which can be audited later.

Following the warning, the Pennsylvania Department of State has requested a vendor to find out the said vulnerabilities and risks in the election system.

Pennsylvania had already accepted an offer from Department of Homeland Security Secretary for risk assessment testing.

Read more details http://www.publicopiniononline.com/story/news/local/2016/10/05/pa-voting-systems-vulnerable-threats-security-company-says/91555852/

The post Security Company Warns Current Voting Systems Vulnerable to threats appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/security-company-warns-current-voting-systems-vulnerable-threats/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151440470150
via Zoe Hamilton

Judges Question Ross Ulbricht’s Life Sentence in Silk Road Appeal

Judges Question Ross Ulbricht’s Life Sentence in Silk Road Appeal
In oral arguments, a panel of three appellate judges was sympathetic to arguments the Silk Road creator’s life sentence without parole was overly harsh. The post Judges Question Ross Ulbricht’s Life Sentence in Silk Road Appeal appeared first on WIRED.

from WIRED https://www.wired.com/2016/10/judges-question-ulbrichts-life-sentence-silk-road-appeal/
from Tumblr http://zoehamilton671.tumblr.com/post/151435358860
via Zoe Hamilton

Security Fatigue Can Put You At Serious Security Threats

Regularly update your password to protect yourself from system hacks

Regularly update your password to protect yourself from system hacks

Have you ever been tired of updating your password? Have you ever come across a scenario where you are so tired that you don’t feel like creating a new account with a strong password to follow?

This is something we like to call security fatigue.

A recent study conducted by National Institute of Standards and Technology (NIST) have found that a lot of home based computer users go through security fatigue and that is often the number one cause of getting hacked.

If you do not take security seriously, you will always put yourself under threat. You should always update your password and try your best to come up with complex passwords.

Read more details http://phys.org/news/2016-10-fatigue-users-hopeless-recklessly.html

The post Security Fatigue Can Put You At Serious Security Threats appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/security-fatigue-can-put-serious-security-threats/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151433937175
via Zoe Hamilton

Poor IoT security could take down power grid, warns researcher

A security researcher who has exposed a series of vulnerabilities in IoT devices says he is concerned about systemic attacks that could take down parts of the internet or national power grids

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400567/Poor-IoT-security-could-take-down-power-grid-warns-researcher


from Tumblr http://zoehamilton671.tumblr.com/post/151431467835
via Zoe Hamilton

Security Think Tank: Combine technology and communication to combat phishing risks

What are the most effective types of security controls and end user training approaches to dealing with phishing?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Combine-technology-and-communication-to-combat-phishing-risks


from Tumblr http://zoehamilton671.tumblr.com/post/151428018020
via Zoe Hamilton

NSA contractor arrest for spying underlines insider threat

Malicious insiders are still one of the biggest threats and a popular means of data theft, according to famous spy catcher Eric O'Neill and other security industry experts

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400533/NSA-contractor-arrest-for-spying-underlines-insider-threat


from Tumblr http://zoehamilton671.tumblr.com/post/151428017790
via Zoe Hamilton

Terror groups likely to be first to unleash cyber weapons, says Eugene Kaspersky

Terror groups are more likely than nation states to unleash cyber weapons and critical infrastructure is the most likely target, warns Kaspersky Lab chief

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400518/Terror-groups-likely-to-be-first-to-unleash-cyber-weapons-says-Eugene-Kaspersky


from Tumblr http://zoehamilton671.tumblr.com/post/151419515125
via Zoe Hamilton

Security Think Tank: Three-pronged approach to phishing prevention

What are the most effective types of security controls and end user training approaches to dealing with phishing?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Three-pronged-approach-to-phishing-prevention


from Tumblr http://zoehamilton671.tumblr.com/post/151419514985
via Zoe Hamilton

Wednesday 5 October 2016

This $16,000 Luxury Smartphone Focuses Entirely On Privacy And Security

$16,000 Solarin phone gets you 256 bit encryption for maximum privacy and security

$16,000 Solarin phone gets you 256 bit encryption for maximum privacy and security

The Solarin phone is the new luxury phone that emphasis completely on mobile security. While it already offers encrypted services like Whatsapp, it was built to give more.

The Solarin phone boasts a very high end powerful cybersecurity protection using 256 bit encryption which the company claims will stop the phone, applications and network immediately in case of a cyber attack.

Defending the the price point of the phone, Tal Cohen, chief executive of Sirin said that the phone is expensive due to high end technology used in it.

The phone is intended to be used by businessmen who carry sensitive corporate data with them.

Read more details https://www.ft.com/content/5035a028-33d7-11e6-bda0-04585c31b153

The post This $16,000 Luxury Smartphone Focuses Entirely On Privacy And Security appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/16000-luxury-smartphone-focuses-entirely-privacy-security/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151398345850
via Zoe Hamilton

Feds Charge NSA Contractor with Taking Top Secret Documents

Feds Charge NSA Contractor with Taking Top Secret Documents
Whether the alleged secret-stealer intended to be a whistleblower or a paid source of hacking tools, the breach is another embarrassment for the spy agency. The post Feds Charge NSA Contractor with Taking Top Secret Documents appeared first on WIRED.

from WIRED https://www.wired.com/2016/10/nsa-contractor-arrested-taking-top-secret-documents/
from Tumblr http://zoehamilton671.tumblr.com/post/151395437105
via Zoe Hamilton

Here’s How You Can Stay Safe On Your Smartphone

These simple tweaks can protect your phone against cyber attacks

These simple tweaks can protect your phone against cyber attacks

Google and Apple may have both released their newest flagship smartphones the Google Pixel and iPhone 7. But are they safe enough from the ground up to protect you from cyber attacks, malware and viruses?

Even though both companies claim their phones are the safest, it never hurts to up security by taking personal precautions.

Start by protecting your phone by putting up a complex password. A strong password that cannot be easily guessed goes a long way.

Backup your data occasionally to protect your phone from ransomware. Safeguard your data so you can instantly wipe off your phone and still get to keep the data.

For more precautionary methods, read more details http://www.usatoday.com/story/money/columnist/2016/09/24/staying-safe-your-smartphone/87446674/

The post Here’s How You Can Stay Safe On Your Smartphone appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/heres-can-stay-safe-smartphone/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151391318225
via Zoe Hamilton

TalkTalk hit by record £400,000 fine over data breach

The Information Commissioner’s Office issues its largest ever data protection fine after more than 150,000 customers had their data exposed by TalkTalk breach

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400451/TalkTalk-hit-by-record-400000-fine-over-data-breach


from Tumblr http://zoehamilton671.tumblr.com/post/151386921550
via Zoe Hamilton

IoT security threat is real, says researcher

The security threat posed by IoT devices is not hype, says security researcher James Lyne

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400433/IoT-security-threat-is-real-says-researcher


from Tumblr http://zoehamilton671.tumblr.com/post/151384066810
via Zoe Hamilton

Birmingham Uni beefs up network automation, virtualisation to support research

The University of Birmingham has deployed a Brocade switching infrastructure and network virtualisation to support the needs of its research teams

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400238/Birmingham-Uni-beefs-up-network-automation-virtualisation-to-support-research


from Tumblr http://zoehamilton671.tumblr.com/post/151378322890
via Zoe Hamilton

SMEs are the Achilles heel for Asean security

Small to medium-sized enterprises in the Asean region will be gateways to large enterprises for cyber criminals unless they improve their security

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400313/SMEs-are-the-Achilles-heel-for-Asean-security


from Tumblr http://zoehamilton671.tumblr.com/post/151377136340
via Zoe Hamilton

Security Think Tank: Making a game of phishing

What are the most effective types of security controls and end user training approaches to dealing with phishing?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Making-a-game-of-phishing


from Tumblr http://zoehamilton671.tumblr.com/post/151376299865
via Zoe Hamilton

Tuesday 4 October 2016

How Did the Feds Get Past Yahoo’s Encryption? Yahoo!

How Did the Feds Get Past Yahoo’s Encryption? Yahoo!
For Apple and now for Yahoo, stronger encryption only made government spying demands more aggressive. The post How Did the Feds Get Past Yahoo’s Encryption? Yahoo! appeared first on WIRED.

from WIRED https://www.wired.com/2016/10/yahoo-spy-scandal-shows-encryption-fails-without-backbone/
from Tumblr http://zoehamilton671.tumblr.com/post/151356806095
via Zoe Hamilton

Becareful Of This Facebook Virus That Has Affected Nearly 1 Million Users

Facebook virus spreads through a link to bogus video site

Facebook virus spreads through a link to bogus video site

A new virus has been released which has caused issues to nearly a million Facebook users. This new Facebook virus is spread through a message that comes with a video link. The message always arrives through the messenger app on smartphones.

If you come across a message that has a link to video.html, avoid clicking on it no matter how enticing the screenshot looks like.

Upon clicking the link, the user is taken to YouTube like site where they are asked to install an extension on their chrome browser. Once installed, a malware will be added to your computer, smartphone or tablet. It can then record anything you are doing.

Read more to see how to remove this virus http://thetechnews.com/2016/10/04/nearly-million-people-affected-facebook-virus/

The post Becareful Of This Facebook Virus That Has Affected Nearly 1 Million Users appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/becareful-facebook-virus-affected-nearly-1-million-users/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151346326190
via Zoe Hamilton

Home IoT technology irrelevant to most home owners

Smart home technology, such as security systems and IoT-enabled thermostats, is overpriced and uninteresting to most home owners, says Beecham Research report

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400358/Home-IoT-technology-irrelevant-to-most-home-owners


from Tumblr http://zoehamilton671.tumblr.com/post/151341736445
via Zoe Hamilton

Look to over-the-top services to secure mobile, says specialist

Mobile network operators should look to 3G and 4G while enterprises should consider OTT services to provide the best security, says telecommunications industry veteran and pioneer Charles Brookson

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400363/Look-to-over-the-top-services-to-secure-mobile-says-specialist


from Tumblr http://zoehamilton671.tumblr.com/post/151341736230
via Zoe Hamilton

Softlayer Founder Forms New Company, Releases App Security Product

Developers can now upgrade their application security easily

Developers can now upgrade their application security easily

Lance Crosby, the former CEO of Softlayer sold his cloud computing platform to IBM just a few years ago. He has now started a new company called StackPath and has released a new security app SecureCDN.

SecureCDN is all about application security. It brings with it a global network of content servers, a web application firewall and a set of tools that can help mitigate distributed DDOS attacks.

In simple words, this security application is meant to be used by developers to help make their apps more secure from the ground up.

Read more details http://www.networkworld.com/article/3126906/security/softlayer-founders-new-company-stackpath-releases-app-security-product.html

The post Softlayer Founder Forms New Company, Releases App Security Product appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/softlayer-founder-forms-new-company-releases-app-security-product/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151339986865
via Zoe Hamilton

Mastercard rolls out selfie payments in UK

Financial services provider Mastercard announces its cardholders in the UK will be able to use a selfie as authentication to pay for goods

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400323/Mastercard-rolls-out-selfie-payments-in-UK


from Tumblr http://zoehamilton671.tumblr.com/post/151337986265
via Zoe Hamilton

Malaysia and Singapore face IT talent shortage

Organisations in Malaysia and Singapore face tough competition to attract the right skills to drive their IT strategies

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400309/Malaysia-and-Singapore-face-IT-talent-shortage


from Tumblr http://zoehamilton671.tumblr.com/post/151337985975
via Zoe Hamilton

You Can All Finally Encrypt Facebook Messenger, So Do It

You Can All Finally Encrypt Facebook Messenger, So Do It
Update your Facebook Messenger app now to add its “Secret Conversations” end-to-end encryption feature. The post You Can All Finally Encrypt Facebook Messenger, So Do It appeared first on WIRED.

from WIRED https://www.wired.com/2016/10/facebook-completely-encrypted-messenger-update-now/
from Tumblr http://zoehamilton671.tumblr.com/post/151331466605
via Zoe Hamilton

DDoS attacks consistent, relentless and costly, report shows

The latest global DDoS report from Neustar underlines the importance of investing in appropriate defences as the high volume of attacks looks set to increase

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400315/DDoS-attacks-consistent-relentless-and-costly-report-shows


from Tumblr http://zoehamilton671.tumblr.com/post/151331319425
via Zoe Hamilton

Mirai IoT botnet code release raises fears of surge in DDoS attacks

Organisations with an online presence should prepare for terabit-class IoT botnet-based DDoS attacks that could knock almost any business offline or disable chunks of the internet, warn security experts

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400311/Mirai-IoT-botnet-code-release-raises-fears-of-surge-in-DDoS-attacks


from Tumblr http://zoehamilton671.tumblr.com/post/151329014930
via Zoe Hamilton

Monday 3 October 2016

UK Opens Up New Cybersecurity HQ In London

UK's new cybersecurity HQ will offer both defensive and offensive tools to fight cyber crimes

UK’s new cybersecurity HQ will offer both defensive and offensive tools to fight cyber crimes

The UK is dramatically increasing its efforts in cyber warfare. This is evident from a latest cyber security centered just opened in London.

The new Cyber Security Centre (NCSC) will be responsible for building and operating a defence network for the country for cyberattacks.

The Government Communications Headquarters (GCHQ) will help with online advice through NCSC.

The new cybersecurity center will also provide offensive capabilities that will be developed at the GCHQ with help from international partners. The NCSC will be directly reporting to the director of GCHQ.

With the new center, UK will be able to ensure faster and more effective response to big cyber attacks

Read more details https://www.siliconrepublic.com/enterprise/cybersecurity-hq-london-ncsc

The post UK Opens Up New Cybersecurity HQ In London appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/uk-opens-new-cybersecurity-hq-london/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151310176120
via Zoe Hamilton

Donald Trump Vows To Increase Nation’s Cybersecurity Capabilities

If elected president, cybersecurity will be Donald Trump's top priority

If elected president, cybersecurity will be Donald Trump’s top priority

Donald Trump announced Monday that he will strengthen the government’s cybersecurity capabilities and make it his utmost priority if he is elected as president of United States.

He said that in order to make America truly safe, we need to make sure cybersecurity is our top priority. He said that if he is elected the commander in chief, he will make sure every step is taken to make cybersecurity better.

America is already fighting a hard battle against cybercrimes which is on the rise throughout the world. With emerging technologies, the government is lacking behind the ability to fight back complex cyber attacks.

Read more details http://www.cbsnews.com/news/donald-trump-vows-to-strengthen-cybersecurity-capabilities/

The post Donald Trump Vows To Increase Nation’s Cybersecurity Capabilities appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/donald-trump-vows-increase-nations-cybersecurity-capabilities/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151300535190
via Zoe Hamilton

A Firm In Las Vegas Warned Cybersecurity Isn’t Only Important To Big Businesses

Vegas Inc will help protect small businesses with affordable cybersecurity solutions

Vegas Inc will help protect small businesses with affordable cybersecurity solutions

Vegas Inc is a cybersecurity based company that focuses on providing efficient, automated and intelligent cybersecurity solutions to small businesses.

The company believes that cyber threats aren’t just threatning to big businesses only. Small businesses are equally targeted when it comes to cyber attacks.

In a report issued by the company, they found out that 71% of all cyber attacks target small businesses with nearly 60% success rate of an attack. No one is protecting small businesses because everyone is focusing on protecting governments and big businesses.

The company aims to bring awareness to the doors of small businesses.

Read more details https://vegasinc.com/business/2016/oct/03/cybersecurity-not-just-for-big-businesses-las-vega/

The post A Firm In Las Vegas Warned Cybersecurity Isn’t Only Important To Big Businesses appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/firm-las-vegas-warned-cybersecurity-isnt-important-big-businesses/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151296012260
via Zoe Hamilton

Time to move on with social engineering training, says Jenny Radcliffe

Organisations need to move from awareness of the risk of social engineering to empowering employees to understand and recognise the threat to protect themselves and the company, says Jenny Radcliffe

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400277/Time-to-move-on-with-social-engineering-training-says-Jenny-Radcliffe


from Tumblr http://zoehamilton671.tumblr.com/post/151294973165
via Zoe Hamilton

19 local councils sign up for Gov.uk Verify trials

GDS will lead pilots of using identity assurance system for local authority digital services

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400252/19-local-councils-sign-up-for-Govuk-Verify-trials


from Tumblr http://zoehamilton671.tumblr.com/post/151290742095
via Zoe Hamilton

Digital apprentice turns social media into power security tool

Social security is not only a source of info for attackers, but a powerful way to raise awareness of security, as a young cyber security working is demonstrating

from ComputerWeekly: IT security http://www.computerweekly.com/news/450400233/Digital-apprentice-turns-social-media-into-power-security-tool


from Tumblr http://zoehamilton671.tumblr.com/post/151284199140
via Zoe Hamilton

Security Think Tank: Phishing awareness a key element of a security positive culture

What are the most effective types of security controls and user training approaches for dealing with phishing?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Phishing-awareness-a-key-element-of-a-security-positive-culture


from Tumblr http://zoehamilton671.tumblr.com/post/151284199040
via Zoe Hamilton