Monday 31 October 2016
It’s Finally Legally To Hack Your Own Devices (Even Your Car)
from WIRED https://www.wired.com/2016/10/hacking-car-pacemaker-toaster-just-became-legal/
from Tumblr http://zoehamilton671.tumblr.com/post/152580858060
via Zoe Hamilton
ICO prepares for post-Brexit GDPR
The Information Commissioner’s Office is to publish a revised timeline for the UK implementing the EU’s General Data Protection Regulation after Brexit
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402036/ICO-prepares-for-post-Brexit-GDPR
from Tumblr http://zoehamilton671.tumblr.com/post/152561209200
via Zoe Hamilton
How software-defined networking can secure critical systems
SDN promises to bring the efficiency gains achieved in server virtualisation to networking, while also boosting security
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402016/How-software-defined-networking-can-secure-critical-systems
from Tumblr http://zoehamilton671.tumblr.com/post/152559668920
via Zoe Hamilton
Self-sovereign identity on the block – ideal or no deal?
There’s a rumour out there in the IT and business world that blockchains could be the magic elixir when it comes to users’ full control and power over their own digital identities. But is that really so?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Self-sovereign-identity-on-the-block-ideal-or-no-deal
from Tumblr http://zoehamilton671.tumblr.com/post/152552958615
via Zoe Hamilton
The cyber threats lurking within every company
Insider threats have been around for a long time, but it is only recently that people have begun to acknowledge the true danger they pose
from ComputerWeekly: IT security http://www.computerweekly.com/feature/The-cyber-threats-lurking-within-every-company
from Tumblr http://zoehamilton671.tumblr.com/post/152552958345
via Zoe Hamilton
Friday 28 October 2016
United Utilities protects field engineering deployment with AirWatch
United Utilities deploys mobile device management software AirWatch to secure Samsung devices running a SAP workforce management app
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401925/United-Utilities-protects-field-engineering-deployment-with-AirWatch
from Tumblr http://zoehamilton671.tumblr.com/post/152426199230
via Zoe Hamilton
Red Cross data breach shows security is still not a priority
The Australian Red Cross Blood Service has responded quickly to a breach of 550,000 donor details, but security commentators say the incident shows security is still not a priority for many organisations
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401910/Red-Cross-data-breach-shows-security-is-still-not-a-priority
from Tumblr http://zoehamilton671.tumblr.com/post/152426199010
via Zoe Hamilton
Apple iCloud and Gmail hacker gets 18 months in jail
A US man is given a sentence of 18 months in jail for hacking into celebrity iCloud and Gmail accounts after investigators failed to find a link with the leak of celebrity nude photos online in 2014
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401905/Apple-iCloud-and-Gmail-hacker-gets-18-months-in-jail
from Tumblr http://zoehamilton671.tumblr.com/post/152426198795
via Zoe Hamilton
Thursday 27 October 2016
Dyn reveals details of complex and sophisticated IoT botnet attack
DNS services provider Dyn, which was the victim of a large-scale DDoS attack perpetrated by an IoT botnet earlier in October, discusses details of its experience
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401857/Dyn-reveals-details-of-complex-and-sophisticated-IoT-botnet-attack
from Tumblr http://zoehamilton671.tumblr.com/post/152382997790
via Zoe Hamilton
Information security set for steep trajectory, says (ISC)2
By helping to create a thriving, diverse and open information security community, (ISC)2 hopes to ensure a steep rise for the profession
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401850/Information-security-set-for-steep-trajectory-says-ISC2
from Tumblr http://zoehamilton671.tumblr.com/post/152382997660
via Zoe Hamilton
Schneider Electric praised for positive response to ICS security flaw
Schneider Electric has patched a security flaw that highlights the vulnerability of industrial control systems to cyber attack
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401831/Schneider-Electric-praised-for-positive-response-to-ICS-security-flaw
from Tumblr http://zoehamilton671.tumblr.com/post/152382997465
via Zoe Hamilton
Wednesday 26 October 2016
US Treasury tells banks to provide more cyber attack information
The US government is calling on financial institutions to share more cyber attack information as concerns grow about the sector’s vulnerability
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401745/US-Treasury-tells-banks-to-provide-more-cyber-attack-information
from Tumblr http://zoehamilton671.tumblr.com/post/152338653235
via Zoe Hamilton
SAP steps up data privacy in Europe
SAP guarantees technicians outside of Europe will not be able to access companies’ sensitive personnel and other records
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401728/SAP-steps-up-data-privacy-in-Europe
from Tumblr http://zoehamilton671.tumblr.com/post/152330235800
via Zoe Hamilton
Tuesday 25 October 2016
Malaysian insurer partners IT supplier to tailor cyber security policies
Partnership is in response to requests from AIG customers for a more comprehensive risk management approach to cyber insurance
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401655/Malaysian-insurer-partners-IT-supplier-to-tailor-cyber-security-policies
from Tumblr http://zoehamilton671.tumblr.com/post/152317197440
via Zoe Hamilton
DevOps largely failing to improve security, study shows
Despite the promise of improved application security, DevOps is failing to deliver due to some key barriers, an HPE study shows
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401645/DevOps-largely-failing-to-improve-security-study-shows
from Tumblr http://zoehamilton671.tumblr.com/post/152295762855
via Zoe Hamilton
Monday 24 October 2016
Dyn DDoS attack highlights vulnerability of global internet infrastructure
Last week’s DDoS attack on DNS firm Dyn has highlighted both the vulnerability of the world’s internet infrastructure, and the dangers of leaving internet of things devices unsecured
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401576/Dyn-DDoS-attack-highlights-vulnerability-of-global-internet-infrastructure
from Tumblr http://zoehamilton671.tumblr.com/post/152251447495
via Zoe Hamilton
In the digital era, customer identity is key
Identity is vital for presenting a consistent customer relationship across digital channels, but not everyone in all organisations understands this shift, according to identity veteran Ian Glazer
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401590/In-the-digital-era-customer-identity-is-key
from Tumblr http://zoehamilton671.tumblr.com/post/152251447150
via Zoe Hamilton
More than 100 MPs ask Obama to halt extradition bid against Lauri Love
UK MPs across all parties call for US President to save activist from extradition to the US on hacking charges on humanitarian grounds
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401567/More-than-100-MPs-ask-Obama-to-halt-extradition-bid-against-Lauri-Love
from Tumblr http://zoehamilton671.tumblr.com/post/152244092130
via Zoe Hamilton
UK National Cyber Security Centre a positive development, says CNI expert
There needs to be greater understanding of cyber threats facing business, and the UK’s new National Cyber Security Centre is a step in the right direction, says CNI expert Barrie Millett
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401575/UK-National-Cyber-Security-Centre-a-positive-development-says-CNI-expert
from Tumblr http://zoehamilton671.tumblr.com/post/152244092055
via Zoe Hamilton
Over 100 MPs sign letter to Obama asking him to drop extradition against alleged hacker Lauri Love
MPs across all parties call for President Barack Obama to save activist Lauri Love from extradition to the US on hacking charges on humanitarian grounds.
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401567/Over-100-MPs-sign-letter-to-Obama-asking-him-to-drop-extradition-against-alleged-hacker-Lauri-Love
from Tumblr http://zoehamilton671.tumblr.com/post/152243977685
via Zoe Hamilton
Friday 21 October 2016
No endgame for cyber security, says Mikko Hypponen
Two of the most valuable lessons in cyber security are to know your enemy and not to rely on users to be secure, according to industry veteran Mikko Hypponen
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401510/No-endgame-for-cyber-security-says-Mikko-Hypponen
from Tumblr http://zoehamilton671.tumblr.com/post/152119912095
via Zoe Hamilton
Major DDoS attack on Dyn causes internet disruption
DNS provider Dyn experiences a large DDoS attack, causing disruption to online services
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401515/Major-DDoS-attack-on-Dyn-causes-internet-disruption
from Tumblr http://zoehamilton671.tumblr.com/post/152115775785
via Zoe Hamilton
Many firms failing on crucial customer experience in digital era
Only through collaboration between all customer-facing parts of a business can it deliver the customer experience that is crucial to survival in the digital era, according to CXP Group consultant Nicole Dufft
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401502/Many-firms-failing-on-crucial-customer-experience-in-digital-era
from Tumblr http://zoehamilton671.tumblr.com/post/152115773315
via Zoe Hamilton
Anonymous’ Most Notorious Hacker Is Back, and He’s Gone Legit
from WIRED https://www.wired.com/2016/10/anonymous-notorious-hacker-back-hes-gone-legit/
from Tumblr http://zoehamilton671.tumblr.com/post/152110586900
via Zoe Hamilton
UK first to bring surveillance under rule of law, says former GCHQ director
Former GCHQ head David Omand says the UK will be the first country in Europe to legislate to regulate digital intelligence and put it under judicial supervision with judicial review
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401482/UK-first-to-bring-surveillance-under-rule-of-law-says-former-GCHQ-director
from Tumblr http://zoehamilton671.tumblr.com/post/152109158150
via Zoe Hamilton
Thursday 20 October 2016
Lessons to be learned from attempted $1bn bank heist
Analysis of an attack aimed at stealing $1bn reveals important lessons for cyber defenders, says BAE Systems head of threat intelligence Adrian Nish
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401419/Lessons-to-be-learned-from-attempted-1bn-bank-heist
from Tumblr http://zoehamilton671.tumblr.com/post/152072150080
via Zoe Hamilton
Getting the balance right now the big data genie is out the bottle
Big data is a fact of life, but getting the balance right when it comes to privacy is crucial to avoid litigation and fines
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Getting-the-balance-right-now-the-big-data-genie-is-out-the-bottle
from Tumblr http://zoehamilton671.tumblr.com/post/152065018655
via Zoe Hamilton
Armed forces minister wants military recruiters to "think different" to attract cyber security pros
Armed Forces minister Mike Penning says military must rethink how it recruits trainees to attract people with the cyber security skills the country needs to protect itself
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401409/Armed-forces-urged-to-rethink-recruitment-process-to-build-out-cyber-security-skills-workforce
from Tumblr http://zoehamilton671.tumblr.com/post/152065018365
via Zoe Hamilton
Wednesday 19 October 2016
Asean countries deepen joint efforts against global cyber threats
Asean Cyber Capacity Programme (ACCP) launched in Singapore to fund cyber security efforts across the region.
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401315/Asean-countries-deepen-joint-efforts-against-global-cyber-threats
from Tumblr http://zoehamilton671.tumblr.com/post/152056495665
via Zoe Hamilton
Ireland to follow UK in setting up national cyber security centre
The Republic of Ireland plans to set up a national cyber security centre and education programme to improve the security of critical infrastructure, businesses and citizens
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401339/Ireland-to-follow-UK-in-setting-up-national-cyber-security-centre
from Tumblr http://zoehamilton671.tumblr.com/post/152030606270
via Zoe Hamilton
Snowden: the IT analyst turned whistleblower who exposed mass surveillance
Oliver Stone’s biopic on Edward Snowden reaches the heart of the ethical crisis posed by mass surveillance for the state and ordinary citizens
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401277/Snowden-the-IT-analyst-turned-whistleblower-who-exposed-mass-surveillance
from Tumblr http://zoehamilton671.tumblr.com/post/152027397535
via Zoe Hamilton
Knowing the business is key to security, says consultant
Security must be based on real-world business needs and practices as traditional perimeter-based security is no longer working, says independent security consultant Brian Honan
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401324/Knowing-the-business-is-key-to-security-says-consultant
from Tumblr http://zoehamilton671.tumblr.com/post/152027397200
via Zoe Hamilton
Imagine if Donald Trump Controlled the NSA
from WIRED https://www.wired.com/2016/10/imagine-donald-trump-controlled-nsa/
from Tumblr http://zoehamilton671.tumblr.com/post/152021557720
via Zoe Hamilton
Information security needs to cast recruitment net wider, says panel
Companies struggling to fill info sec roles should focus on finding people who can do what they need, not on qualifications, according to a security industry panel
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401311/Information-security-needs-to-cast-recruitment-net-wider-says-panel
from Tumblr http://zoehamilton671.tumblr.com/post/152017864600
via Zoe Hamilton
Tuesday 18 October 2016
Saving Lauri Love: activists plan their next move
An eclectic bunch of activists, charity workers and reformed hackers spent a rainy Sunday afternoon plotting their next move in a campaign to save Lauri Love from extradition to the US on hacking charges
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401264/Saving-Lauri-Love-activists-plan-their-next-move
from Tumblr http://zoehamilton671.tumblr.com/post/151984401365
via Zoe Hamilton
Cyber security is about big team efforts, says CNI expert
Cyber security requires a team approach, based on a good understanding of the threat, to achieve effective resilience, according to Barrie Millett of the Cyber Rescue Alliance
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401266/Cyber-security-is-about-big-team-efforts-says-CNI-expert
from Tumblr http://zoehamilton671.tumblr.com/post/151984401165
via Zoe Hamilton
Most businesses vulnerable to cyber attacks through firmware, study shows
Company culture and overall attitude to security is a major contribution to vulnerability to cyber attack through firmware, a study by Isaca has revealed
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401249/Most-businesses-vulnerable-to-cyber-attacks-through-firmware-study-shows
from Tumblr http://zoehamilton671.tumblr.com/post/151980788255
via Zoe Hamilton
Businesses underprepared for GDPR, study shows
Lack of consumer and regulatory understanding, combined with low technical and cultural preparedness, represents a major threat to revenue and brand value, according to a Symantec state of privacy report
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401248/Businesses-underprepared-for-GDPR-study-shows
from Tumblr http://zoehamilton671.tumblr.com/post/151974062175
via Zoe Hamilton
Monday 17 October 2016
Intelligence agencies collected personal data unlawfully for a decade, says IPT
UK intelligence agencies have been collecting communications data on the population without adequate oversight for a decade, according to the Investigatory Powers Tribunal
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401216/Intelligence-agencies-collected-personal-data-unlawfully-for-a-decade-says-IPT
from Tumblr http://zoehamilton671.tumblr.com/post/151938776525
via Zoe Hamilton
Business and GDPR to drive consumer identity projects
Business demand for consumer identity management capability is growing to enable new business models, improve customer engagement and ensure General Data Protection Regulation compliance, says KuppingerCole
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401204/Business-and-GDPR-to-drive-consumer-identity-projects
from Tumblr http://zoehamilton671.tumblr.com/post/151934866300
via Zoe Hamilton
UK firms could face £122bn in data breach fines in 2018
The PCI Security Standards Council is urging firms to act now to avoid exponentially increased penalties under new EU data protection regulations
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401190/UK-firms-could-face-122bn-in-data-breach-fines-in-2018
from Tumblr http://zoehamilton671.tumblr.com/post/151925717655
via Zoe Hamilton
Friday 14 October 2016
Firms urged to automate security certificate backup after Globalsign blackout
Online firms are being urged to reduce their dependency on single certificate authorities by automating backup processes
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401082/Firms-urged-to-automate-security-certificate-backup-after-Globalsign-blackout
from Tumblr http://zoehamilton671.tumblr.com/post/151796160880
via Zoe Hamilton
Want to Know Julian Assange’s Endgame? He Told You A Decade Ago
from WIRED https://www.wired.com/2016/10/want-know-julian-assanges-endgame-told-decade-ago/
from Tumblr http://zoehamilton671.tumblr.com/post/151795843735
via Zoe Hamilton
Retail websites riddled with security holes, researchers warn
Retailers urged to improve the security of their online stores amid a series of discoveries of cyber criminal campaigns to exploit vulnerabilities in retail websites
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401065/Retail-websites-riddled-with-security-holes-researchers-warn
from Tumblr http://zoehamilton671.tumblr.com/post/151787982210
via Zoe Hamilton
Thursday 13 October 2016
Lloyds Bank launches technologies to improve and secure customer services
Lloyds Bank is investing in the latest technologies to provide customers with convenient and secure banking services
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400998/Lloyds-Bank-launches-technologies-to-improve-and-secure-customer-services
from Tumblr http://zoehamilton671.tumblr.com/post/151751882055
via Zoe Hamilton
Almost two-thirds of US office workers unaware of ransomware threat
Nearly half of ransomware attacks are aimed at office workers, but almost two-thirds of those polled in the US are unaware of the threat
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400992/Almost-two-thirds-of-US-office-workers-unaware-of-ransomware-threat
from Tumblr http://zoehamilton671.tumblr.com/post/151745655380
via Zoe Hamilton
Wednesday 12 October 2016
Thousands of significant cyber incidents hit Australian organisations
Australian Cyber Security Centre report reveals growing threat, with energy, banking and finance, and communications sectors targeted most often
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400934/Thousands-of-significant-cyber-incidents-hit-Australian-organisations
from Tumblr http://zoehamilton671.tumblr.com/post/151739956290
via Zoe Hamilton
Government to name and shame departments failing to secure email
The NCSC is piloting various cyber security intiatives with government departments such as Dmarc and other email security measures, and plans to name and shame those which fail to comply
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400935/Government-to-name-and-shame-departments-failing-to-secure-email
from Tumblr http://zoehamilton671.tumblr.com/post/151710629280
via Zoe Hamilton
Can The U.S Election Really Be Hacked?
Russian hacking U.S in the upcoming presidential election became a hot topic during the debate on Sunday night. It raised a question: can the U.S elections really be hacked?
Experts had a say on a national level. They believe it cannot happen. But there is still enough evidence that leaves us with this question.
According to most cybersecurity professionals, the U.S systems are under no threat from hackers. This is because the systems are too decentralized and most of them operate offline.
In order to be effectively hacked, the systems need to be online. But since they aren’t, there is little to no threat.
Read more details http://www.usatoday.com/story/tech/news/2016/10/10/could-us-election-hacked/91866334/
The post Can The U.S Election Really Be Hacked? appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/can-u-s-election-really-hacked/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151710493395
via Zoe Hamilton
A Hacking Group Vandalized Buzzfeed’s Posts
A few posts of Buzzfeed news website were vandalized by a hacking group known as ‘Ourmine’. The hack came as a result when buzzfeed posted a news article identifying a teenage hacker that the site claimed to be part of the hacking group.
OurMine denied the report and said that the person was just a fan of their hacking group. But then they decided to hack Buzzfeed and changed many of its posts into warnings.
All posts that were changed read:
Hacked by OurMine team, dont share fake news about us again, we have your database. Next time it will be public. Don’t **** with OurMine again.
Read more details http://www.theverge.com/2016/10/5/13172430/buzzfeed-hacked-by-ourmine-after-exposing-member
The post A Hacking Group Vandalized Buzzfeed’s Posts appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/hacking-group-vandalized-buzzfeeds-posts/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151708491155
via Zoe Hamilton
Government failing to prepare UK for robotics and AI
A report produced by the Science and Technology Committee has warned that the UK is fundamentally unprepared for the changes that will come from robotics and artificial intelligence
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400921/Government-failing-to-prepare-UK-for-robotics-and-AI
from Tumblr http://zoehamilton671.tumblr.com/post/151700645865
via Zoe Hamilton
G7 sets financial sector cyber defence guidelines as attacks grow
G7 countries have agreed cyber security guidelines in response to concerns about the safety of interconnected global financial systems that are increasingly coming under attack, according to Symantec
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400914/G7-sets-financial-sector-cyber-defence-guidelines-as-attacks-grow
from Tumblr http://zoehamilton671.tumblr.com/post/151700119590
via Zoe Hamilton
Gary McKinnon: Why Lauri Love should be spared the nightmare of extradition
Computer activist Lauri Love should be spared a life sentence in a US jail, says former hacker Gary McKinnon
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Gary-McKinnon-Why-Lauri-Love-should-be-spared-the-nightmare-of-extradition
from Tumblr http://zoehamilton671.tumblr.com/post/151697936750
via Zoe Hamilton
Tuesday 11 October 2016
Signal, the Cypherpunk App of Choice, Adds Disappearing Messages
from WIRED https://www.wired.com/2016/10/signal-cypherpunk-app-choice-adds-disappearing-messages/
from Tumblr http://zoehamilton671.tumblr.com/post/151674494700
via Zoe Hamilton
Middle East CISO Council CEO warns of global cyber security storm
Cyber security issues will be a major theme at this month’s GITEX Technology Week 2016 conference in Dubai
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400829/Middle-East-CISO-Council-CEO-warns-of-global-cyber-security-storm
from Tumblr http://zoehamilton671.tumblr.com/post/151664617315
via Zoe Hamilton
Security Think Tank: Defend against phishing with training, technology and reporting
What are the most effective types of security controls and user training approaches to dealing with phishing?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Defend-against-phishing-with-training-technology-and-reporting
from Tumblr http://zoehamilton671.tumblr.com/post/151661695005
via Zoe Hamilton
Three-quarters of UK policing websites lack secure encryption
A quarter of UK policing websites have secure foundations, but half have room for improvement, and the remaining quarter are in need of serious and urgent improvement, according to the Centre for Public Safety
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400830/Three-quarters-of-UK-policing-websites-lack-secure-encryption
from Tumblr http://zoehamilton671.tumblr.com/post/151654685140
via Zoe Hamilton
Monday 10 October 2016
What To Do If You Find Out Your iPhone Is Being Hacked?
Smartphone hacking is on the rise and many people report their phones getting hacked. Whether you use an iPhone or any Android powered phone, you can easily be hacked.
If you detect that your phone is being accessed without your authorization, you should take necessary actions immediately. Below is a guide explaining what to do in case your iPhone is being hacked.
Start by diagnosing the problem:
- First of all, backup all your data. In order to learn how to completely backup your iPhone, follow this iPhone, iPad or iPod Touch backup guide.
- Remove the SIM card you are using and install a backup SIM (any number you do not regularly use). It is better if you use a prepaid SIM card for this purpose.
- Start the phone and leave it on for a while and see if your phone is still being spammed with text messages. If the messages stop appearing, then the SIM you were using is being targeted and your phone is safe.
- If however weird messages continue to keep coming on the new number, you need to logout of messages. To do this, simply go to your phone settings, access accounts and log out your Apple ID.
- Now proceed to registering new Apple ID and use the phone with the new ID. If the messages or other activity goes away, your Apple ID is being targeted or spammed.
- Turn off all your data. This includes 3G, 4G and wireless. If your phone is still being spammed with unauthorized activity, your phone is compromised and must be cleaned.
Here are possible solutions to the problem:
If you find out that your number is being spammed, contact your carrier and ask them to block the phone number(s) that are spamming the SIM.
If your Apple ID is the culprit, block the iMessage number that is being used to spam your phone. Here’s a good way to block calls, messages or FaceTime calls on an iPhone.
If your phone is compromised, you will have to delete all the data and reset it to factory settings. You can follow this detailed guide on fully backing up your data for resetting the phone back to factory settings.
If you are feeling adventurous or revengeful, there are hacking services that can hack the hacker for you. Try contacting with your query to admin@hackerdemy.com and they will assist you with the process.
Further more, having some hacking experience can also help you detect where the cyber attacks are coming from. You can become a hacker by following our guide to becoming a professional hacker.
The post What To Do If You Find Out Your iPhone Is Being Hacked? appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/find-iphone-hacked/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151633454940
via Zoe Hamilton
NSA Chief Says U.S Needs To Upgrade To Fight Against Cyber Threats
NSA Chief outlined that U.S needs to upgrade their cyber security systems to fight rising cyber threats.
He said that the United States will need to rethink its strategy and use a combination of strategies to fight back the rising risks of foreign countries attacking our computing networks.
He gave this speech during a visit to a packed room at the Kennedy School on Wednesday.
He also outlined the daunting challenges of defeating cyber threats of foreign countries and independant cyber criminals.
In order to confront cyber attacks, he said that the U.S needs better network protection.
Read more details http://news.harvard.edu/gazette/story/2016/10/u-s-needs-upgrade-against-cyber-threats-commander-says/
The post NSA Chief Says U.S Needs To Upgrade To Fight Against Cyber Threats appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/nsa-chief-says-u-s-needs-upgrade-fight-cyber-threats/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151626120195
via Zoe Hamilton
Kaspersky And Secucloud Partner To Combat Cyber Attacks
Secucloud has just created a new Elastic Cloud Security System. It is a cloud based security framework that will use Kaspersky Lab’s high end technologies. This will enable better security for Secucloud customers.
The company has combined modules like the multi-analyzer threat protection, packet analyzer, SAND SSL Scan and its IABS engine with the powerful technologies created by Kaspersky to offer enterprise grade security solutions.
The company previously has enjoyed a reputation for distributing and use enterprise technologies like APT protection to fight back malware effectively. With Kaspersky’s help, their technology will be even more powerful.
Read more details http://www.itnewsafrica.com/2016/10/seculoud-partners-with-kaspersky-to-combat-cyber-threats/
The post Kaspersky And Secucloud Partner To Combat Cyber Attacks appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/kaspersky-secucloud-partner-combat-cyber-attacks/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151619073790
via Zoe Hamilton
Kaspersky And Secucloud Partner To Combat Cyber Attacks
Secucloud has just created a new Elastic Cloud Security System. It is a cloud based security framework that will use Kaspersky Lab’s high end technologies. This will enable better security for Secucloud customers.
The company has combined modules like the multi-analyzer threat protection, packet analyzer, SAND SSL Scan and its IABS engine with the powerful technologies created by Kaspersky to offer enterprise grade security solutions.
The company previously has enjoyed a reputation for distributing and use enterprise technologies like APT protection to fight back malware effectively. With Kaspersky’s help, their technology will be even more powerful.
Read more details http://www.itnewsafrica.com/2016/10/seculoud-partners-with-kaspersky-to-combat-cyber-threats/
The post Kaspersky And Secucloud Partner To Combat Cyber Attacks appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/kaspersky-secucloud-partner-combat-cyber-attacks/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151619073790
via Zoe Hamilton
Security Think Tank: Phishing: protect, educate and limit damage
What are the most effective types of security controls and end user training approaches to dealing with phishing?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Phishing-protect-educate-and-limit-damage
from Tumblr http://zoehamilton671.tumblr.com/post/151617275470
via Zoe Hamilton
Singapore: a nation united on its digital future
Singapore is setting itself to be a leader in the digital age, with a reorganised government department the protagonist
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400519/Singapore-a-nation-united-on-its-digital-future
from Tumblr http://zoehamilton671.tumblr.com/post/151614686825
via Zoe Hamilton
Smartwatches banned from UK Cabinet as EC plans IoT security standards
The EC is planning a security certification scheme for internet of things devices as the UK Cabinet bans smartwatches amid heightened fears of cyber espionage
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400714/Smartwatches-banned-from-UK-cabinet-as-EC-plans-IoT-security-standards
from Tumblr http://zoehamilton671.tumblr.com/post/151606714185
via Zoe Hamilton
Security Think Tank: Four key elements to defending against phishing attacks
What are the most effective types of security controls and end user training approaches to dealing with phishing?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Four-key-elements-to-defending-against-phishing-attacks
from Tumblr http://zoehamilton671.tumblr.com/post/151605045760
via Zoe Hamilton
Friday 7 October 2016
Security industry failing users, says behaviour expert
The information security community is failing to educate users in a way that helps then understand cyber threats and change their behaviour, according to consultant Jessica Barker
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400621/Security-industry-failing-users-says-behaviour-expert
from Tumblr http://zoehamilton671.tumblr.com/post/151472740125
via Zoe Hamilton
London police charge third member of ATM hacking gang
London police arrest and charge a third man suspected of being involved in a series of ATM thefts across the UK in 2014 using malware to bypass security controls
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400607/London-police-charge-third-member-of-ATM-hacking-gang
from Tumblr http://zoehamilton671.tumblr.com/post/151466426805
via Zoe Hamilton
Thursday 6 October 2016
The FBI Wants To Crack Another Dead Terrorist’s Locked iPhone
from WIRED https://www.wired.com/2016/10/fbi-wants-crack-another-dead-terrorists-locked-iphone/
from Tumblr http://zoehamilton671.tumblr.com/post/151456882615
via Zoe Hamilton
What are the best programming languages to learn if you want to be a hacker?
If you ask us, we’d say it depends.
Learning a programming language will always somehow help you out in the future. Nearly every complex cybersecurity job requires some sort of professional knowledge about a programming language.
To start with hacking however, create a Live USB with Debian, Kali, Ubuntu, RedHat or Linux distribution. Start by learning shell scripting first. The best way to do so is to learn on Kali Linux 2.0 on your Live-USB preferably connected to a MacBook because it has many tools pre installed that will keep you away from installing additional features.
While learning shell scripting, visit https://www.learnshell.org/ because it has a built in console that you can try to code on while you are learning.
Next you should go for Python. Python will allow you to make complex algorithms using only a couple of commands. And also it is one of the best languages for beginners.
Visit https://www.learnpython.org/ to take on python 2.x tutorial. This is made by the same people who made shell one. Python 2.x is great because it has a number of different libraries. Python may be a bit old school for 2016, but it is still very worth it. You can use Python to:
- Connect via telnet to any network device
- Query SNMP objects that are on a network device
- Connect via SSH to any device on the network
- update, query or populate any MySQL database
- Build customized artwork packets and then analyze them
- Create apps to automate daily networking tasks that include collecting information, testing clients and making network discovery.
Python is also pretty good due to its cross platform nature. It can be easily used on Linux, Windows or OS X.
Here is another website to check if you want to learn python http://www.diveintopython3.net/.
If you visit this website, you need to make sure that you have a command prompt running on the side so you can work and experiment while learning at the same time.
Using the sites mentioned above, you can easily learn to launch a DoS attack or do SQL Injections.
Once you are ready, head over to the popular http://www.hackthissite.org/ and start putting your skills to the test.
Additionally, as a hacker you should have the knowledge to create websites. For that you should learn html, css and javascript. This will greatly help you in hacking websites because most of them are coded using these languages.
Plus you can always use your browser’s ‘view code’ feature to see the code that is powering the website. There’s always a loophole somewhere in the code.
Last but not the least, go for c++. It isn’t exactly beginner friendly but it definitely is the best one to learn when you become an advanced user.
To learn additional skills, head over to WonderHowTo website.
The post What are the best programming languages to learn if you want to be a hacker? appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/best-programming-languages-learn-want-hacker/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151444712710
via Zoe Hamilton
Security Company Warns Current Voting Systems Vulnerable to threats
A computer security company is warning that Pennsylvania’s voting systems are vulnerable to cyber threats.
According to Carbon Black Inc., a company based in Massachussets, Pennsylvania may pose a really big security risk in during the 2016 U.S. Presidential Election.
The weak spot as detected by the company are the electronic voting machines that are lacking a paper trail which can be audited later.
Following the warning, the Pennsylvania Department of State has requested a vendor to find out the said vulnerabilities and risks in the election system.
Pennsylvania had already accepted an offer from Department of Homeland Security Secretary for risk assessment testing.
Read more details http://www.publicopiniononline.com/story/news/local/2016/10/05/pa-voting-systems-vulnerable-threats-security-company-says/91555852/
The post Security Company Warns Current Voting Systems Vulnerable to threats appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/security-company-warns-current-voting-systems-vulnerable-threats/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151440470150
via Zoe Hamilton
Judges Question Ross Ulbricht’s Life Sentence in Silk Road Appeal
from WIRED https://www.wired.com/2016/10/judges-question-ulbrichts-life-sentence-silk-road-appeal/
from Tumblr http://zoehamilton671.tumblr.com/post/151435358860
via Zoe Hamilton
Security Fatigue Can Put You At Serious Security Threats
Have you ever been tired of updating your password? Have you ever come across a scenario where you are so tired that you don’t feel like creating a new account with a strong password to follow?
This is something we like to call security fatigue.
A recent study conducted by National Institute of Standards and Technology (NIST) have found that a lot of home based computer users go through security fatigue and that is often the number one cause of getting hacked.
If you do not take security seriously, you will always put yourself under threat. You should always update your password and try your best to come up with complex passwords.
Read more details http://phys.org/news/2016-10-fatigue-users-hopeless-recklessly.html
The post Security Fatigue Can Put You At Serious Security Threats appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/security-fatigue-can-put-serious-security-threats/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151433937175
via Zoe Hamilton
Poor IoT security could take down power grid, warns researcher
A security researcher who has exposed a series of vulnerabilities in IoT devices says he is concerned about systemic attacks that could take down parts of the internet or national power grids
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400567/Poor-IoT-security-could-take-down-power-grid-warns-researcher
from Tumblr http://zoehamilton671.tumblr.com/post/151431467835
via Zoe Hamilton
Security Think Tank: Combine technology and communication to combat phishing risks
What are the most effective types of security controls and end user training approaches to dealing with phishing?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Combine-technology-and-communication-to-combat-phishing-risks
from Tumblr http://zoehamilton671.tumblr.com/post/151428018020
via Zoe Hamilton
NSA contractor arrest for spying underlines insider threat
Malicious insiders are still one of the biggest threats and a popular means of data theft, according to famous spy catcher Eric O'Neill and other security industry experts
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400533/NSA-contractor-arrest-for-spying-underlines-insider-threat
from Tumblr http://zoehamilton671.tumblr.com/post/151428017790
via Zoe Hamilton
Terror groups likely to be first to unleash cyber weapons, says Eugene Kaspersky
Terror groups are more likely than nation states to unleash cyber weapons and critical infrastructure is the most likely target, warns Kaspersky Lab chief
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400518/Terror-groups-likely-to-be-first-to-unleash-cyber-weapons-says-Eugene-Kaspersky
from Tumblr http://zoehamilton671.tumblr.com/post/151419515125
via Zoe Hamilton
Security Think Tank: Three-pronged approach to phishing prevention
What are the most effective types of security controls and end user training approaches to dealing with phishing?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Three-pronged-approach-to-phishing-prevention
from Tumblr http://zoehamilton671.tumblr.com/post/151419514985
via Zoe Hamilton
Wednesday 5 October 2016
This $16,000 Luxury Smartphone Focuses Entirely On Privacy And Security
The Solarin phone is the new luxury phone that emphasis completely on mobile security. While it already offers encrypted services like Whatsapp, it was built to give more.
The Solarin phone boasts a very high end powerful cybersecurity protection using 256 bit encryption which the company claims will stop the phone, applications and network immediately in case of a cyber attack.
Defending the the price point of the phone, Tal Cohen, chief executive of Sirin said that the phone is expensive due to high end technology used in it.
The phone is intended to be used by businessmen who carry sensitive corporate data with them.
Read more details https://www.ft.com/content/5035a028-33d7-11e6-bda0-04585c31b153
The post This $16,000 Luxury Smartphone Focuses Entirely On Privacy And Security appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/16000-luxury-smartphone-focuses-entirely-privacy-security/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151398345850
via Zoe Hamilton
Feds Charge NSA Contractor with Taking Top Secret Documents
from WIRED https://www.wired.com/2016/10/nsa-contractor-arrested-taking-top-secret-documents/
from Tumblr http://zoehamilton671.tumblr.com/post/151395437105
via Zoe Hamilton
Here’s How You Can Stay Safe On Your Smartphone
Google and Apple may have both released their newest flagship smartphones the Google Pixel and iPhone 7. But are they safe enough from the ground up to protect you from cyber attacks, malware and viruses?
Even though both companies claim their phones are the safest, it never hurts to up security by taking personal precautions.
Start by protecting your phone by putting up a complex password. A strong password that cannot be easily guessed goes a long way.
Backup your data occasionally to protect your phone from ransomware. Safeguard your data so you can instantly wipe off your phone and still get to keep the data.
For more precautionary methods, read more details http://www.usatoday.com/story/money/columnist/2016/09/24/staying-safe-your-smartphone/87446674/
The post Here’s How You Can Stay Safe On Your Smartphone appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/heres-can-stay-safe-smartphone/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151391318225
via Zoe Hamilton
TalkTalk hit by record £400,000 fine over data breach
The Information Commissioner’s Office issues its largest ever data protection fine after more than 150,000 customers had their data exposed by TalkTalk breach
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400451/TalkTalk-hit-by-record-400000-fine-over-data-breach
from Tumblr http://zoehamilton671.tumblr.com/post/151386921550
via Zoe Hamilton
IoT security threat is real, says researcher
The security threat posed by IoT devices is not hype, says security researcher James Lyne
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400433/IoT-security-threat-is-real-says-researcher
from Tumblr http://zoehamilton671.tumblr.com/post/151384066810
via Zoe Hamilton
Birmingham Uni beefs up network automation, virtualisation to support research
The University of Birmingham has deployed a Brocade switching infrastructure and network virtualisation to support the needs of its research teams
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400238/Birmingham-Uni-beefs-up-network-automation-virtualisation-to-support-research
from Tumblr http://zoehamilton671.tumblr.com/post/151378322890
via Zoe Hamilton
SMEs are the Achilles heel for Asean security
Small to medium-sized enterprises in the Asean region will be gateways to large enterprises for cyber criminals unless they improve their security
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400313/SMEs-are-the-Achilles-heel-for-Asean-security
from Tumblr http://zoehamilton671.tumblr.com/post/151377136340
via Zoe Hamilton
Security Think Tank: Making a game of phishing
What are the most effective types of security controls and end user training approaches to dealing with phishing?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Making-a-game-of-phishing
from Tumblr http://zoehamilton671.tumblr.com/post/151376299865
via Zoe Hamilton
Tuesday 4 October 2016
How Did the Feds Get Past Yahoo’s Encryption? Yahoo!
from WIRED https://www.wired.com/2016/10/yahoo-spy-scandal-shows-encryption-fails-without-backbone/
from Tumblr http://zoehamilton671.tumblr.com/post/151356806095
via Zoe Hamilton
Becareful Of This Facebook Virus That Has Affected Nearly 1 Million Users
A new virus has been released which has caused issues to nearly a million Facebook users. This new Facebook virus is spread through a message that comes with a video link. The message always arrives through the messenger app on smartphones.
If you come across a message that has a link to video.html, avoid clicking on it no matter how enticing the screenshot looks like.
Upon clicking the link, the user is taken to YouTube like site where they are asked to install an extension on their chrome browser. Once installed, a malware will be added to your computer, smartphone or tablet. It can then record anything you are doing.
Read more to see how to remove this virus http://thetechnews.com/2016/10/04/nearly-million-people-affected-facebook-virus/
The post Becareful Of This Facebook Virus That Has Affected Nearly 1 Million Users appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/becareful-facebook-virus-affected-nearly-1-million-users/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151346326190
via Zoe Hamilton
Home IoT technology irrelevant to most home owners
Smart home technology, such as security systems and IoT-enabled thermostats, is overpriced and uninteresting to most home owners, says Beecham Research report
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400358/Home-IoT-technology-irrelevant-to-most-home-owners
from Tumblr http://zoehamilton671.tumblr.com/post/151341736445
via Zoe Hamilton
Look to over-the-top services to secure mobile, says specialist
Mobile network operators should look to 3G and 4G while enterprises should consider OTT services to provide the best security, says telecommunications industry veteran and pioneer Charles Brookson
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400363/Look-to-over-the-top-services-to-secure-mobile-says-specialist
from Tumblr http://zoehamilton671.tumblr.com/post/151341736230
via Zoe Hamilton
Softlayer Founder Forms New Company, Releases App Security Product
Lance Crosby, the former CEO of Softlayer sold his cloud computing platform to IBM just a few years ago. He has now started a new company called StackPath and has released a new security app SecureCDN.
SecureCDN is all about application security. It brings with it a global network of content servers, a web application firewall and a set of tools that can help mitigate distributed DDOS attacks.
In simple words, this security application is meant to be used by developers to help make their apps more secure from the ground up.
Read more details http://www.networkworld.com/article/3126906/security/softlayer-founders-new-company-stackpath-releases-app-security-product.html
The post Softlayer Founder Forms New Company, Releases App Security Product appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/softlayer-founder-forms-new-company-releases-app-security-product/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151339986865
via Zoe Hamilton
Mastercard rolls out selfie payments in UK
Financial services provider Mastercard announces its cardholders in the UK will be able to use a selfie as authentication to pay for goods
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400323/Mastercard-rolls-out-selfie-payments-in-UK
from Tumblr http://zoehamilton671.tumblr.com/post/151337986265
via Zoe Hamilton
Malaysia and Singapore face IT talent shortage
Organisations in Malaysia and Singapore face tough competition to attract the right skills to drive their IT strategies
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400309/Malaysia-and-Singapore-face-IT-talent-shortage
from Tumblr http://zoehamilton671.tumblr.com/post/151337985975
via Zoe Hamilton
You Can All Finally Encrypt Facebook Messenger, So Do It
from WIRED https://www.wired.com/2016/10/facebook-completely-encrypted-messenger-update-now/
from Tumblr http://zoehamilton671.tumblr.com/post/151331466605
via Zoe Hamilton
DDoS attacks consistent, relentless and costly, report shows
The latest global DDoS report from Neustar underlines the importance of investing in appropriate defences as the high volume of attacks looks set to increase
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400315/DDoS-attacks-consistent-relentless-and-costly-report-shows
from Tumblr http://zoehamilton671.tumblr.com/post/151331319425
via Zoe Hamilton
Mirai IoT botnet code release raises fears of surge in DDoS attacks
Organisations with an online presence should prepare for terabit-class IoT botnet-based DDoS attacks that could knock almost any business offline or disable chunks of the internet, warn security experts
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400311/Mirai-IoT-botnet-code-release-raises-fears-of-surge-in-DDoS-attacks
from Tumblr http://zoehamilton671.tumblr.com/post/151329014930
via Zoe Hamilton
Monday 3 October 2016
UK Opens Up New Cybersecurity HQ In London
The UK is dramatically increasing its efforts in cyber warfare. This is evident from a latest cyber security centered just opened in London.
The new Cyber Security Centre (NCSC) will be responsible for building and operating a defence network for the country for cyberattacks.
The Government Communications Headquarters (GCHQ) will help with online advice through NCSC.
The new cybersecurity center will also provide offensive capabilities that will be developed at the GCHQ with help from international partners. The NCSC will be directly reporting to the director of GCHQ.
With the new center, UK will be able to ensure faster and more effective response to big cyber attacks
Read more details https://www.siliconrepublic.com/enterprise/cybersecurity-hq-london-ncsc
The post UK Opens Up New Cybersecurity HQ In London appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/uk-opens-new-cybersecurity-hq-london/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151310176120
via Zoe Hamilton
Donald Trump Vows To Increase Nation’s Cybersecurity Capabilities
Donald Trump announced Monday that he will strengthen the government’s cybersecurity capabilities and make it his utmost priority if he is elected as president of United States.
He said that in order to make America truly safe, we need to make sure cybersecurity is our top priority. He said that if he is elected the commander in chief, he will make sure every step is taken to make cybersecurity better.
America is already fighting a hard battle against cybercrimes which is on the rise throughout the world. With emerging technologies, the government is lacking behind the ability to fight back complex cyber attacks.
Read more details http://www.cbsnews.com/news/donald-trump-vows-to-strengthen-cybersecurity-capabilities/
The post Donald Trump Vows To Increase Nation’s Cybersecurity Capabilities appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/donald-trump-vows-increase-nations-cybersecurity-capabilities/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151300535190
via Zoe Hamilton
A Firm In Las Vegas Warned Cybersecurity Isn’t Only Important To Big Businesses
Vegas Inc is a cybersecurity based company that focuses on providing efficient, automated and intelligent cybersecurity solutions to small businesses.
The company believes that cyber threats aren’t just threatning to big businesses only. Small businesses are equally targeted when it comes to cyber attacks.
In a report issued by the company, they found out that 71% of all cyber attacks target small businesses with nearly 60% success rate of an attack. No one is protecting small businesses because everyone is focusing on protecting governments and big businesses.
The company aims to bring awareness to the doors of small businesses.
Read more details https://vegasinc.com/business/2016/oct/03/cybersecurity-not-just-for-big-businesses-las-vega/
The post A Firm In Las Vegas Warned Cybersecurity Isn’t Only Important To Big Businesses appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/firm-las-vegas-warned-cybersecurity-isnt-important-big-businesses/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/151296012260
via Zoe Hamilton
Time to move on with social engineering training, says Jenny Radcliffe
Organisations need to move from awareness of the risk of social engineering to empowering employees to understand and recognise the threat to protect themselves and the company, says Jenny Radcliffe
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400277/Time-to-move-on-with-social-engineering-training-says-Jenny-Radcliffe
from Tumblr http://zoehamilton671.tumblr.com/post/151294973165
via Zoe Hamilton
19 local councils sign up for Gov.uk Verify trials
GDS will lead pilots of using identity assurance system for local authority digital services
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400252/19-local-councils-sign-up-for-Govuk-Verify-trials
from Tumblr http://zoehamilton671.tumblr.com/post/151290742095
via Zoe Hamilton
Digital apprentice turns social media into power security tool
Social security is not only a source of info for attackers, but a powerful way to raise awareness of security, as a young cyber security working is demonstrating
from ComputerWeekly: IT security http://www.computerweekly.com/news/450400233/Digital-apprentice-turns-social-media-into-power-security-tool
from Tumblr http://zoehamilton671.tumblr.com/post/151284199140
via Zoe Hamilton
Security Think Tank: Phishing awareness a key element of a security positive culture
What are the most effective types of security controls and user training approaches for dealing with phishing?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Phishing-awareness-a-key-element-of-a-security-positive-culture
from Tumblr http://zoehamilton671.tumblr.com/post/151284199040
via Zoe Hamilton