Thursday, 9 March 2017

Open Rights Group calls for control of spies’ use of zero-days

Wikileaks’ publication of documents detailing CIA hacking tools has prompted calls for government to control spy agencies’ use of vulnerabilities in widely used hardware and software

from ComputerWeekly: IT security http://www.computerweekly.com/news/450414569/Open-Rights-Group-calls-for-control-of-spies-use-of-zero-days


from Tumblr http://zoehamilton671.tumblr.com/post/158189057555
via Zoe Hamilton

Wednesday, 8 March 2017

Here’s why so many businesses are stocking up on bitcoins

Stocking on bitcoins is not the best way to ward off against ransomware

One of the big reasons why small companies and businesses are stocking up on bitcoins is because this form of currency has become the number one choice for cyber criminals.

In simple words, when a cyber attacker acquires critical data and asks for ransom, they want to be paid via bitcoins. But then again, are companies safe when they pay cyber attackers via bitcoins? Not quite.

A recent report reveals that cyber criminals have become very clever. Once they know a company is ready to pay them to return data, they may start asking for more. Additionally, there is no guarantee that you’ll get your data back when you pay them off.

But then what should you do if you become a victim of a ransomware?

A simple solution is prevention. 

  • The only real way you can protect yourself from ransomware is to get a reliable and trustworthy backup system in place. With the right backup system, you can restore all your data without ever worrying about paying a single penny to cyber attackers.

Need An Easy Backup Solution For Home Or Office? Check Out >>> Carbonite!

In a recent report, it was revealed that most cyber criminals take down companies for a week or longer. For a thriving business, going offline for a week is a major blow to its reputation and sales.

And since cyber attacks are on the rise these days, protecting your systems from such attacks should be your number one priority instead of stocking up on bitcoins.

Collecting bitcoins in hopes of paying cyber criminals is a temporary solution because once you pay a criminal, he may come back to steal your data again.

If you are still not well protected, you should seek help from a professional. There are many cyber security professionals and companies eager to help you protect your data from threats in the cyber world.

Invest in protection to help prevent future attacks and stay safe from the rising threats cyber criminals.

The post Here’s why so many businesses are stocking up on bitcoins appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/heres-why-so-many-businesses-are-stocking-up-on-bitcoins/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/158160498385
via Zoe Hamilton

Cloud-based ID management is key to PostNL’s public cloud strategy

Mail company uses Azure, AWS, Salesforce, SuccessFactors, Office 365 and Microsoft Dynamics as it shifts from on-premise IT

from ComputerWeekly: IT security http://www.computerweekly.com/news/450414491/Cloud-based-ID-management-is-key-to-PostNLs-public-cloud-strategy


from Tumblr http://zoehamilton671.tumblr.com/post/158154757780
via Zoe Hamilton

How the CIA’s Hacking Hoard Makes Everyone Less Secure

How the CIA’s Hacking Hoard Makes Everyone Less Secure
By keeping dozens of its spying tools secret, the CIA may have left billions of people open to being hacked. The post How the CIA’s Hacking Hoard Makes Everyone Less Secure appeared first on WIRED.

from WIRED https://www.wired.com/2017/03/cias-hacking-hoard-makes-everyone-less-secure/
from Tumblr http://zoehamilton671.tumblr.com/post/158152486225
via Zoe Hamilton

WhatsApp, Signal, ProtonMail safe from CIA hacking tools

Top secure messaging and email apps are said to be safe from CIA hacking tools, but organisations are urged to assess their own vulnerability if the tools were to fall into the hands of cyber criminals

from ComputerWeekly: IT security http://www.computerweekly.com/news/450414477/WhatsApp-Signal-ProtonMail-safe-from-CIA-hacking-tools


from Tumblr http://zoehamilton671.tumblr.com/post/158145792715
via Zoe Hamilton

Tuesday, 7 March 2017

How the CIA Can Hack Your Phone, PC, and TV (Says WikiLeaks)

How the CIA Can Hack Your Phone, PC, and TV (Says WikiLeaks)
A new leak hints at the spooks’ digital arsenal, from iOS and Android to Samsung smart TVs. The post How the CIA Can Hack Your Phone, PC, and TV (Says WikiLeaks) appeared first on WIRED.

from WIRED https://www.wired.com/2017/03/cia-can-hack-phone-pc-tv-says-wikileaks/
from Tumblr http://zoehamilton671.tumblr.com/post/158125255895
via Zoe Hamilton

From bootcamp to business: getting connected

This is the second in a series of articles charting the progress of participants from HutZero, a new cyber security entrepreneur acceleration programme run by Cyber London (CyLon) and the Centre for Security Information Technologies (CSIT) at Queen’s University Belfast

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/From-bootcamp-to-business-getting-connected


from Tumblr http://zoehamilton671.tumblr.com/post/158113731135
via Zoe Hamilton