
from WIRED https://www.wired.com/2016/10/hacking-car-pacemaker-toaster-just-became-legal/
from Tumblr http://zoehamilton671.tumblr.com/post/152580858060
via Zoe Hamilton
The Information Commissioner’s Office is to publish a revised timeline for the UK implementing the EU’s General Data Protection Regulation after Brexit
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402036/ICO-prepares-for-post-Brexit-GDPR
SDN promises to bring the efficiency gains achieved in server virtualisation to networking, while also boosting security
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402016/How-software-defined-networking-can-secure-critical-systems
There’s a rumour out there in the IT and business world that blockchains could be the magic elixir when it comes to users’ full control and power over their own digital identities. But is that really so?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Self-sovereign-identity-on-the-block-ideal-or-no-deal
Insider threats have been around for a long time, but it is only recently that people have begun to acknowledge the true danger they pose
from ComputerWeekly: IT security http://www.computerweekly.com/feature/The-cyber-threats-lurking-within-every-company
United Utilities deploys mobile device management software AirWatch to secure Samsung devices running a SAP workforce management app
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401925/United-Utilities-protects-field-engineering-deployment-with-AirWatch
The Australian Red Cross Blood Service has responded quickly to a breach of 550,000 donor details, but security commentators say the incident shows security is still not a priority for many organisations
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401910/Red-Cross-data-breach-shows-security-is-still-not-a-priority
A US man is given a sentence of 18 months in jail for hacking into celebrity iCloud and Gmail accounts after investigators failed to find a link with the leak of celebrity nude photos online in 2014
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401905/Apple-iCloud-and-Gmail-hacker-gets-18-months-in-jail
DNS services provider Dyn, which was the victim of a large-scale DDoS attack perpetrated by an IoT botnet earlier in October, discusses details of its experience
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401857/Dyn-reveals-details-of-complex-and-sophisticated-IoT-botnet-attack
By helping to create a thriving, diverse and open information security community, (ISC)2 hopes to ensure a steep rise for the profession
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401850/Information-security-set-for-steep-trajectory-says-ISC2
Schneider Electric has patched a security flaw that highlights the vulnerability of industrial control systems to cyber attack
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401831/Schneider-Electric-praised-for-positive-response-to-ICS-security-flaw
The US government is calling on financial institutions to share more cyber attack information as concerns grow about the sector’s vulnerability
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401745/US-Treasury-tells-banks-to-provide-more-cyber-attack-information
SAP guarantees technicians outside of Europe will not be able to access companies’ sensitive personnel and other records
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401728/SAP-steps-up-data-privacy-in-Europe
Partnership is in response to requests from AIG customers for a more comprehensive risk management approach to cyber insurance
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401655/Malaysian-insurer-partners-IT-supplier-to-tailor-cyber-security-policies
Despite the promise of improved application security, DevOps is failing to deliver due to some key barriers, an HPE study shows
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401645/DevOps-largely-failing-to-improve-security-study-shows
Last week’s DDoS attack on DNS firm Dyn has highlighted both the vulnerability of the world’s internet infrastructure, and the dangers of leaving internet of things devices unsecured
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401576/Dyn-DDoS-attack-highlights-vulnerability-of-global-internet-infrastructure
Identity is vital for presenting a consistent customer relationship across digital channels, but not everyone in all organisations understands this shift, according to identity veteran Ian Glazer
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401590/In-the-digital-era-customer-identity-is-key
UK MPs across all parties call for US President to save activist from extradition to the US on hacking charges on humanitarian grounds
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401567/More-than-100-MPs-ask-Obama-to-halt-extradition-bid-against-Lauri-Love
There needs to be greater understanding of cyber threats facing business, and the UK’s new National Cyber Security Centre is a step in the right direction, says CNI expert Barrie Millett
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401575/UK-National-Cyber-Security-Centre-a-positive-development-says-CNI-expert
MPs across all parties call for President Barack Obama to save activist Lauri Love from extradition to the US on hacking charges on humanitarian grounds.
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401567/Over-100-MPs-sign-letter-to-Obama-asking-him-to-drop-extradition-against-alleged-hacker-Lauri-Love
Two of the most valuable lessons in cyber security are to know your enemy and not to rely on users to be secure, according to industry veteran Mikko Hypponen
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401510/No-endgame-for-cyber-security-says-Mikko-Hypponen
DNS provider Dyn experiences a large DDoS attack, causing disruption to online services
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401515/Major-DDoS-attack-on-Dyn-causes-internet-disruption
Only through collaboration between all customer-facing parts of a business can it deliver the customer experience that is crucial to survival in the digital era, according to CXP Group consultant Nicole Dufft
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401502/Many-firms-failing-on-crucial-customer-experience-in-digital-era
Former GCHQ head David Omand says the UK will be the first country in Europe to legislate to regulate digital intelligence and put it under judicial supervision with judicial review
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401482/UK-first-to-bring-surveillance-under-rule-of-law-says-former-GCHQ-director
Analysis of an attack aimed at stealing $1bn reveals important lessons for cyber defenders, says BAE Systems head of threat intelligence Adrian Nish
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401419/Lessons-to-be-learned-from-attempted-1bn-bank-heist
Big data is a fact of life, but getting the balance right when it comes to privacy is crucial to avoid litigation and fines
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Getting-the-balance-right-now-the-big-data-genie-is-out-the-bottle
Armed Forces minister Mike Penning says military must rethink how it recruits trainees to attract people with the cyber security skills the country needs to protect itself
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401409/Armed-forces-urged-to-rethink-recruitment-process-to-build-out-cyber-security-skills-workforce
Asean Cyber Capacity Programme (ACCP) launched in Singapore to fund cyber security efforts across the region.
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401315/Asean-countries-deepen-joint-efforts-against-global-cyber-threats
The Republic of Ireland plans to set up a national cyber security centre and education programme to improve the security of critical infrastructure, businesses and citizens
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401339/Ireland-to-follow-UK-in-setting-up-national-cyber-security-centre
Oliver Stone’s biopic on Edward Snowden reaches the heart of the ethical crisis posed by mass surveillance for the state and ordinary citizens
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401277/Snowden-the-IT-analyst-turned-whistleblower-who-exposed-mass-surveillance
Security must be based on real-world business needs and practices as traditional perimeter-based security is no longer working, says independent security consultant Brian Honan
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401324/Knowing-the-business-is-key-to-security-says-consultant
Companies struggling to fill info sec roles should focus on finding people who can do what they need, not on qualifications, according to a security industry panel
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401311/Information-security-needs-to-cast-recruitment-net-wider-says-panel
An eclectic bunch of activists, charity workers and reformed hackers spent a rainy Sunday afternoon plotting their next move in a campaign to save Lauri Love from extradition to the US on hacking charges
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401264/Saving-Lauri-Love-activists-plan-their-next-move
Cyber security requires a team approach, based on a good understanding of the threat, to achieve effective resilience, according to Barrie Millett of the Cyber Rescue Alliance
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401266/Cyber-security-is-about-big-team-efforts-says-CNI-expert
Company culture and overall attitude to security is a major contribution to vulnerability to cyber attack through firmware, a study by Isaca has revealed
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401249/Most-businesses-vulnerable-to-cyber-attacks-through-firmware-study-shows
Lack of consumer and regulatory understanding, combined with low technical and cultural preparedness, represents a major threat to revenue and brand value, according to a Symantec state of privacy report
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401248/Businesses-underprepared-for-GDPR-study-shows
UK intelligence agencies have been collecting communications data on the population without adequate oversight for a decade, according to the Investigatory Powers Tribunal
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401216/Intelligence-agencies-collected-personal-data-unlawfully-for-a-decade-says-IPT
Business demand for consumer identity management capability is growing to enable new business models, improve customer engagement and ensure General Data Protection Regulation compliance, says KuppingerCole
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401204/Business-and-GDPR-to-drive-consumer-identity-projects
The PCI Security Standards Council is urging firms to act now to avoid exponentially increased penalties under new EU data protection regulations
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401190/UK-firms-could-face-122bn-in-data-breach-fines-in-2018
Online firms are being urged to reduce their dependency on single certificate authorities by automating backup processes
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401082/Firms-urged-to-automate-security-certificate-backup-after-Globalsign-blackout
Retailers urged to improve the security of their online stores amid a series of discoveries of cyber criminal campaigns to exploit vulnerabilities in retail websites
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401065/Retail-websites-riddled-with-security-holes-researchers-warn
Lloyds Bank is investing in the latest technologies to provide customers with convenient and secure banking services
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400998/Lloyds-Bank-launches-technologies-to-improve-and-secure-customer-services
Nearly half of ransomware attacks are aimed at office workers, but almost two-thirds of those polled in the US are unaware of the threat
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400992/Almost-two-thirds-of-US-office-workers-unaware-of-ransomware-threat
Australian Cyber Security Centre report reveals growing threat, with energy, banking and finance, and communications sectors targeted most often
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400934/Thousands-of-significant-cyber-incidents-hit-Australian-organisations
The NCSC is piloting various cyber security intiatives with government departments such as Dmarc and other email security measures, and plans to name and shame those which fail to comply
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400935/Government-to-name-and-shame-departments-failing-to-secure-email
Experts believe US elections cannot be hacked because they’re mostly offline
Russian hacking U.S in the upcoming presidential election became a hot topic during the debate on Sunday night. It raised a question: can the U.S elections really be hacked?
Experts had a say on a national level. They believe it cannot happen. But there is still enough evidence that leaves us with this question.
According to most cybersecurity professionals, the U.S systems are under no threat from hackers. This is because the systems are too decentralized and most of them operate offline.
In order to be effectively hacked, the systems need to be online. But since they aren’t, there is little to no threat.
Read more details http://www.usatoday.com/story/tech/news/2016/10/10/could-us-election-hacked/91866334/
The post Can The U.S Election Really Be Hacked? appeared first on Cyber Security Portal.
OurMine hacking group hacks Buzzfeed and warns them not to run fake stories
A few posts of Buzzfeed news website were vandalized by a hacking group known as ‘Ourmine’. The hack came as a result when buzzfeed posted a news article identifying a teenage hacker that the site claimed to be part of the hacking group.
OurMine denied the report and said that the person was just a fan of their hacking group. But then they decided to hack Buzzfeed and changed many of its posts into warnings.
All posts that were changed read:
Hacked by OurMine team, dont share fake news about us again, we have your database. Next time it will be public. Don’t **** with OurMine again.
Read more details http://www.theverge.com/2016/10/5/13172430/buzzfeed-hacked-by-ourmine-after-exposing-member
The post A Hacking Group Vandalized Buzzfeed’s Posts appeared first on Cyber Security Portal.
A report produced by the Science and Technology Committee has warned that the UK is fundamentally unprepared for the changes that will come from robotics and artificial intelligence
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400921/Government-failing-to-prepare-UK-for-robotics-and-AI
G7 countries have agreed cyber security guidelines in response to concerns about the safety of interconnected global financial systems that are increasingly coming under attack, according to Symantec
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400914/G7-sets-financial-sector-cyber-defence-guidelines-as-attacks-grow
Computer activist Lauri Love should be spared a life sentence in a US jail, says former hacker Gary McKinnon
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Gary-McKinnon-Why-Lauri-Love-should-be-spared-the-nightmare-of-extradition
Cyber security issues will be a major theme at this month’s GITEX Technology Week 2016 conference in Dubai
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400829/Middle-East-CISO-Council-CEO-warns-of-global-cyber-security-storm
What are the most effective types of security controls and user training approaches to dealing with phishing?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Defend-against-phishing-with-training-technology-and-reporting
A quarter of UK policing websites have secure foundations, but half have room for improvement, and the remaining quarter are in need of serious and urgent improvement, according to the Centre for Public Safety
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400830/Three-quarters-of-UK-policing-websites-lack-secure-encryption
iPhone can be easily restored to factory settings to protect against hacks
Smartphone hacking is on the rise and many people report their phones getting hacked. Whether you use an iPhone or any Android powered phone, you can easily be hacked.
If you detect that your phone is being accessed without your authorization, you should take necessary actions immediately. Below is a guide explaining what to do in case your iPhone is being hacked.
Start by diagnosing the problem:
Here are possible solutions to the problem:
If you find out that your number is being spammed, contact your carrier and ask them to block the phone number(s) that are spamming the SIM.
If your Apple ID is the culprit, block the iMessage number that is being used to spam your phone. Here’s a good way to block calls, messages or FaceTime calls on an iPhone.
If your phone is compromised, you will have to delete all the data and reset it to factory settings. You can follow this detailed guide on fully backing up your data for resetting the phone back to factory settings.
If you are feeling adventurous or revengeful, there are hacking services that can hack the hacker for you. Try contacting with your query to admin@hackerdemy.com and they will assist you with the process.
Further more, having some hacking experience can also help you detect where the cyber attacks are coming from. You can become a hacker by following our guide to becoming a professional hacker.
The post What To Do If You Find Out Your iPhone Is Being Hacked? appeared first on Cyber Security Portal.
USA needs to change its strategy to protect against cyber warfare
NSA Chief outlined that U.S needs to upgrade their cyber security systems to fight rising cyber threats.
He said that the United States will need to rethink its strategy and use a combination of strategies to fight back the rising risks of foreign countries attacking our computing networks.
He gave this speech during a visit to a packed room at the Kennedy School on Wednesday.
He also outlined the daunting challenges of defeating cyber threats of foreign countries and independant cyber criminals.
In order to confront cyber attacks, he said that the U.S needs better network protection.
Read more details http://news.harvard.edu/gazette/story/2016/10/u-s-needs-upgrade-against-cyber-threats-commander-says/
The post NSA Chief Says U.S Needs To Upgrade To Fight Against Cyber Threats appeared first on Cyber Security Portal.
Secucloud security solutions will be more secure thanks to Kaspersky technologies
Secucloud has just created a new Elastic Cloud Security System. It is a cloud based security framework that will use Kaspersky Lab’s high end technologies. This will enable better security for Secucloud customers.
The company has combined modules like the multi-analyzer threat protection, packet analyzer, SAND SSL Scan and its IABS engine with the powerful technologies created by Kaspersky to offer enterprise grade security solutions.
The company previously has enjoyed a reputation for distributing and use enterprise technologies like APT protection to fight back malware effectively. With Kaspersky’s help, their technology will be even more powerful.
Read more details http://www.itnewsafrica.com/2016/10/seculoud-partners-with-kaspersky-to-combat-cyber-threats/
The post Kaspersky And Secucloud Partner To Combat Cyber Attacks appeared first on Cyber Security Portal.
Secucloud security solutions will be more secure thanks to Kaspersky technologies
Secucloud has just created a new Elastic Cloud Security System. It is a cloud based security framework that will use Kaspersky Lab’s high end technologies. This will enable better security for Secucloud customers.
The company has combined modules like the multi-analyzer threat protection, packet analyzer, SAND SSL Scan and its IABS engine with the powerful technologies created by Kaspersky to offer enterprise grade security solutions.
The company previously has enjoyed a reputation for distributing and use enterprise technologies like APT protection to fight back malware effectively. With Kaspersky’s help, their technology will be even more powerful.
Read more details http://www.itnewsafrica.com/2016/10/seculoud-partners-with-kaspersky-to-combat-cyber-threats/
The post Kaspersky And Secucloud Partner To Combat Cyber Attacks appeared first on Cyber Security Portal.
What are the most effective types of security controls and end user training approaches to dealing with phishing?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Phishing-protect-educate-and-limit-damage
Singapore is setting itself to be a leader in the digital age, with a reorganised government department the protagonist
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400519/Singapore-a-nation-united-on-its-digital-future
The EC is planning a security certification scheme for internet of things devices as the UK Cabinet bans smartwatches amid heightened fears of cyber espionage
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400714/Smartwatches-banned-from-UK-cabinet-as-EC-plans-IoT-security-standards
What are the most effective types of security controls and end user training approaches to dealing with phishing?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Four-key-elements-to-defending-against-phishing-attacks
The information security community is failing to educate users in a way that helps then understand cyber threats and change their behaviour, according to consultant Jessica Barker
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400621/Security-industry-failing-users-says-behaviour-expert
London police arrest and charge a third man suspected of being involved in a series of ATM thefts across the UK in 2014 using malware to bypass security controls
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400607/London-police-charge-third-member-of-ATM-hacking-gang
Become the ultimate hacker by starting with these programming languages
If you ask us, we’d say it depends.
Learning a programming language will always somehow help you out in the future. Nearly every complex cybersecurity job requires some sort of professional knowledge about a programming language.
To start with hacking however, create a Live USB with Debian, Kali, Ubuntu, RedHat or Linux distribution. Start by learning shell scripting first. The best way to do so is to learn on Kali Linux 2.0 on your Live-USB preferably connected to a MacBook because it has many tools pre installed that will keep you away from installing additional features.
While learning shell scripting, visit https://www.learnshell.org/ because it has a built in console that you can try to code on while you are learning.
Next you should go for Python. Python will allow you to make complex algorithms using only a couple of commands. And also it is one of the best languages for beginners.
Visit https://www.learnpython.org/ to take on python 2.x tutorial. This is made by the same people who made shell one. Python 2.x is great because it has a number of different libraries. Python may be a bit old school for 2016, but it is still very worth it. You can use Python to:
Python is also pretty good due to its cross platform nature. It can be easily used on Linux, Windows or OS X.
Here is another website to check if you want to learn python http://www.diveintopython3.net/.
If you visit this website, you need to make sure that you have a command prompt running on the side so you can work and experiment while learning at the same time.
Using the sites mentioned above, you can easily learn to launch a DoS attack or do SQL Injections.
Once you are ready, head over to the popular http://www.hackthissite.org/ and start putting your skills to the test.
Additionally, as a hacker you should have the knowledge to create websites. For that you should learn html, css and javascript. This will greatly help you in hacking websites because most of them are coded using these languages.
Plus you can always use your browser’s ‘view code’ feature to see the code that is powering the website. There’s always a loophole somewhere in the code.
Last but not the least, go for c++. It isn’t exactly beginner friendly but it definitely is the best one to learn when you become an advanced user.
To learn additional skills, head over to WonderHowTo website.
The post What are the best programming languages to learn if you want to be a hacker? appeared first on Cyber Security Portal.
Security vulnerabilities will lead to disastrous security threats
A computer security company is warning that Pennsylvania’s voting systems are vulnerable to cyber threats.
According to Carbon Black Inc., a company based in Massachussets, Pennsylvania may pose a really big security risk in during the 2016 U.S. Presidential Election.
The weak spot as detected by the company are the electronic voting machines that are lacking a paper trail which can be audited later.
Following the warning, the Pennsylvania Department of State has requested a vendor to find out the said vulnerabilities and risks in the election system.
Pennsylvania had already accepted an offer from Department of Homeland Security Secretary for risk assessment testing.
Read more details http://www.publicopiniononline.com/story/news/local/2016/10/05/pa-voting-systems-vulnerable-threats-security-company-says/91555852/
The post Security Company Warns Current Voting Systems Vulnerable to threats appeared first on Cyber Security Portal.
Regularly update your password to protect yourself from system hacks
Have you ever been tired of updating your password? Have you ever come across a scenario where you are so tired that you don’t feel like creating a new account with a strong password to follow?
This is something we like to call security fatigue.
A recent study conducted by National Institute of Standards and Technology (NIST) have found that a lot of home based computer users go through security fatigue and that is often the number one cause of getting hacked.
If you do not take security seriously, you will always put yourself under threat. You should always update your password and try your best to come up with complex passwords.
Read more details http://phys.org/news/2016-10-fatigue-users-hopeless-recklessly.html
The post Security Fatigue Can Put You At Serious Security Threats appeared first on Cyber Security Portal.
A security researcher who has exposed a series of vulnerabilities in IoT devices says he is concerned about systemic attacks that could take down parts of the internet or national power grids
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400567/Poor-IoT-security-could-take-down-power-grid-warns-researcher
What are the most effective types of security controls and end user training approaches to dealing with phishing?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Combine-technology-and-communication-to-combat-phishing-risks
Malicious insiders are still one of the biggest threats and a popular means of data theft, according to famous spy catcher Eric O'Neill and other security industry experts
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400533/NSA-contractor-arrest-for-spying-underlines-insider-threat
Terror groups are more likely than nation states to unleash cyber weapons and critical infrastructure is the most likely target, warns Kaspersky Lab chief
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400518/Terror-groups-likely-to-be-first-to-unleash-cyber-weapons-says-Eugene-Kaspersky
What are the most effective types of security controls and end user training approaches to dealing with phishing?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Three-pronged-approach-to-phishing-prevention
$16,000 Solarin phone gets you 256 bit encryption for maximum privacy and security
The Solarin phone is the new luxury phone that emphasis completely on mobile security. While it already offers encrypted services like Whatsapp, it was built to give more.
The Solarin phone boasts a very high end powerful cybersecurity protection using 256 bit encryption which the company claims will stop the phone, applications and network immediately in case of a cyber attack.
Defending the the price point of the phone, Tal Cohen, chief executive of Sirin said that the phone is expensive due to high end technology used in it.
The phone is intended to be used by businessmen who carry sensitive corporate data with them.
Read more details https://www.ft.com/content/5035a028-33d7-11e6-bda0-04585c31b153
The post This $16,000 Luxury Smartphone Focuses Entirely On Privacy And Security appeared first on Cyber Security Portal.
These simple tweaks can protect your phone against cyber attacks
Google and Apple may have both released their newest flagship smartphones the Google Pixel and iPhone 7. But are they safe enough from the ground up to protect you from cyber attacks, malware and viruses?
Even though both companies claim their phones are the safest, it never hurts to up security by taking personal precautions.
Start by protecting your phone by putting up a complex password. A strong password that cannot be easily guessed goes a long way.
Backup your data occasionally to protect your phone from ransomware. Safeguard your data so you can instantly wipe off your phone and still get to keep the data.
For more precautionary methods, read more details http://www.usatoday.com/story/money/columnist/2016/09/24/staying-safe-your-smartphone/87446674/
The post Here’s How You Can Stay Safe On Your Smartphone appeared first on Cyber Security Portal.
The Information Commissioner’s Office issues its largest ever data protection fine after more than 150,000 customers had their data exposed by TalkTalk breach
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400451/TalkTalk-hit-by-record-400000-fine-over-data-breach
The security threat posed by IoT devices is not hype, says security researcher James Lyne
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400433/IoT-security-threat-is-real-says-researcher
The University of Birmingham has deployed a Brocade switching infrastructure and network virtualisation to support the needs of its research teams
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400238/Birmingham-Uni-beefs-up-network-automation-virtualisation-to-support-research
Small to medium-sized enterprises in the Asean region will be gateways to large enterprises for cyber criminals unless they improve their security
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400313/SMEs-are-the-Achilles-heel-for-Asean-security
What are the most effective types of security controls and end user training approaches to dealing with phishing?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Making-a-game-of-phishing
Facebook virus spreads through a link to bogus video site
A new virus has been released which has caused issues to nearly a million Facebook users. This new Facebook virus is spread through a message that comes with a video link. The message always arrives through the messenger app on smartphones.
If you come across a message that has a link to video.html, avoid clicking on it no matter how enticing the screenshot looks like.
Upon clicking the link, the user is taken to YouTube like site where they are asked to install an extension on their chrome browser. Once installed, a malware will be added to your computer, smartphone or tablet. It can then record anything you are doing.
Read more to see how to remove this virus http://thetechnews.com/2016/10/04/nearly-million-people-affected-facebook-virus/
The post Becareful Of This Facebook Virus That Has Affected Nearly 1 Million Users appeared first on Cyber Security Portal.
Smart home technology, such as security systems and IoT-enabled thermostats, is overpriced and uninteresting to most home owners, says Beecham Research report
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400358/Home-IoT-technology-irrelevant-to-most-home-owners
Mobile network operators should look to 3G and 4G while enterprises should consider OTT services to provide the best security, says telecommunications industry veteran and pioneer Charles Brookson
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400363/Look-to-over-the-top-services-to-secure-mobile-says-specialist
Developers can now upgrade their application security easily
Lance Crosby, the former CEO of Softlayer sold his cloud computing platform to IBM just a few years ago. He has now started a new company called StackPath and has released a new security app SecureCDN.
SecureCDN is all about application security. It brings with it a global network of content servers, a web application firewall and a set of tools that can help mitigate distributed DDOS attacks.
In simple words, this security application is meant to be used by developers to help make their apps more secure from the ground up.
Read more details http://www.networkworld.com/article/3126906/security/softlayer-founders-new-company-stackpath-releases-app-security-product.html
The post Softlayer Founder Forms New Company, Releases App Security Product appeared first on Cyber Security Portal.
Financial services provider Mastercard announces its cardholders in the UK will be able to use a selfie as authentication to pay for goods
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400323/Mastercard-rolls-out-selfie-payments-in-UK
Organisations in Malaysia and Singapore face tough competition to attract the right skills to drive their IT strategies
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400309/Malaysia-and-Singapore-face-IT-talent-shortage
The latest global DDoS report from Neustar underlines the importance of investing in appropriate defences as the high volume of attacks looks set to increase
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400315/DDoS-attacks-consistent-relentless-and-costly-report-shows
Organisations with an online presence should prepare for terabit-class IoT botnet-based DDoS attacks that could knock almost any business offline or disable chunks of the internet, warn security experts
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400311/Mirai-IoT-botnet-code-release-raises-fears-of-surge-in-DDoS-attacks
UK’s new cybersecurity HQ will offer both defensive and offensive tools to fight cyber crimes
The UK is dramatically increasing its efforts in cyber warfare. This is evident from a latest cyber security centered just opened in London.
The new Cyber Security Centre (NCSC) will be responsible for building and operating a defence network for the country for cyberattacks.
The Government Communications Headquarters (GCHQ) will help with online advice through NCSC.
The new cybersecurity center will also provide offensive capabilities that will be developed at the GCHQ with help from international partners. The NCSC will be directly reporting to the director of GCHQ.
With the new center, UK will be able to ensure faster and more effective response to big cyber attacks
Read more details https://www.siliconrepublic.com/enterprise/cybersecurity-hq-london-ncsc
The post UK Opens Up New Cybersecurity HQ In London appeared first on Cyber Security Portal.
If elected president, cybersecurity will be Donald Trump’s top priority
Donald Trump announced Monday that he will strengthen the government’s cybersecurity capabilities and make it his utmost priority if he is elected as president of United States.
He said that in order to make America truly safe, we need to make sure cybersecurity is our top priority. He said that if he is elected the commander in chief, he will make sure every step is taken to make cybersecurity better.
America is already fighting a hard battle against cybercrimes which is on the rise throughout the world. With emerging technologies, the government is lacking behind the ability to fight back complex cyber attacks.
Read more details http://www.cbsnews.com/news/donald-trump-vows-to-strengthen-cybersecurity-capabilities/
The post Donald Trump Vows To Increase Nation’s Cybersecurity Capabilities appeared first on Cyber Security Portal.
Vegas Inc will help protect small businesses with affordable cybersecurity solutions
Vegas Inc is a cybersecurity based company that focuses on providing efficient, automated and intelligent cybersecurity solutions to small businesses.
The company believes that cyber threats aren’t just threatning to big businesses only. Small businesses are equally targeted when it comes to cyber attacks.
In a report issued by the company, they found out that 71% of all cyber attacks target small businesses with nearly 60% success rate of an attack. No one is protecting small businesses because everyone is focusing on protecting governments and big businesses.
The company aims to bring awareness to the doors of small businesses.
Read more details https://vegasinc.com/business/2016/oct/03/cybersecurity-not-just-for-big-businesses-las-vega/
The post A Firm In Las Vegas Warned Cybersecurity Isn’t Only Important To Big Businesses appeared first on Cyber Security Portal.
Organisations need to move from awareness of the risk of social engineering to empowering employees to understand and recognise the threat to protect themselves and the company, says Jenny Radcliffe
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400277/Time-to-move-on-with-social-engineering-training-says-Jenny-Radcliffe
GDS will lead pilots of using identity assurance system for local authority digital services
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400252/19-local-councils-sign-up-for-Govuk-Verify-trials
Social security is not only a source of info for attackers, but a powerful way to raise awareness of security, as a young cyber security working is demonstrating
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400233/Digital-apprentice-turns-social-media-into-power-security-tool
What are the most effective types of security controls and user training approaches for dealing with phishing?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Phishing-awareness-a-key-element-of-a-security-positive-culture