Friday, December 29, 2017

This is the best list of cybersecurity predictions for 2018 by The Outline

CYBERSECURITY Predictions 2018

What alarming digital risk will hazard us in 2018? There are endless records, created by data security bloggers and cybersecurity counseling firms, that endeavor to answer that inquiry with differing thickness of popular expressions. Kelly Shortridge, an item chief at the security evaluation firm Security Scorecard, chose to make a definitive rundown of 2018 cybersecurity expectations by collecting a huge number of records utilizing Markov chains, a procedure that can create English sentences in view of the likelihood of which words come after each other.

Monday, November 20, 2017

Financia Times - Cyber security collaboration is key to dark web deterrent

Cyber security collaboration FT

What the expert said:

“It’s been alarmingly quiet,” says Martin Borrett, chief technical officer for IBM Security Europe. “We were expecting to see a wave of attacks after the NSA dump. I am still expecting something major before Christmas.”

“Although the effects have been less widespread, Bad Rabbit shows the hackers are not resting on their laurels,” says Betsy Cooper, executive director at Berkeley University’s centre for long-term cyber security.

Ms Cooper adds: “One of the key lessons from NotPetya is that it’s not as easy to get victims to pay ransomware fines as perhaps the hackers thought. Payments for NotPetya were relatively low. “So some hackers may be taking more time and seeking to more carefully execute attacks to ensure that such attacks reap greater financial rewards.”

 “We now have that healthy paranoia, and there’s a level of heightened awareness,” adds Mr Borrett. “Everyone’s being that bit more vigilant.”

The NCSC, a division of UK intelligence agency GCHQ, says 590 were considered “significant incidents” while more than 30 were assessed as “being sufficiently serious enough to require a cross-government response process”.

“The UK faces threats from across the globe on a daily basis,” says Ciaran Martin, NCSC chief executive. “It’s not a question of ‘if’ cyber attacks will happen, it’s a matter of ‘when’.”

“We need to get better at sharing information because the bad guys are really good at it,” says Brian Kelly, Rackspace chief security officer.


Source: Financial Times

Tuesday, September 26, 2017

Deloitte - Cyber attack - Clients Email - Data Breach

Deloitte cyber attack

Deloitte, a major USA and global accounting firm, revealed that it was hit with a cybersecurity breach that may have extended from October of last year through this past March, the Guardian reports. The company -- one of the world's Big Four accounting firms -- which works with large banks, global firms and government agencies, among others, provides tax and auditing services, operations consulting, merger and acquisition assistance and, wait for it, cybersecurity advice.

Wednesday, August 23, 2017

Blue Whale Challenge – What You Need To Know And Do!

blue whales suicide game


Parents are waking up to this new online threat to their kids: ‘The Blue Whale Challenge’ which in extreme steps leads children to commit suicide. Fingers are flying fast on WhatsApp, Facebook and Twitter sharing ‘facts’ about the challenge, tips about mentoring kids, and opinions of experts that are adding to the confusion.

Tuesday, June 6, 2017

Security Experts warning: Computer viruses may be in your Video Subtitles.


Security Experts warning Computer viruses may be in your Video Subtitles.

Security experts warned that hackers can take control of your computer through hides computer viruses in your online video subtitles.

Friday, May 5, 2017

Tuesday, April 25, 2017

8 Ways Governments Can Improve Their Cybersecurity

It’s hard to find a major cyberattack over the last five years where identity — generally a compromised password — did not provide the vector of attack.

goverments improve cybersecurity

Target, Sony Pictures, the Democratic National Committee (DNC) and the U.S. Office of Personnel Management (OPM) each were breached because they relied on passwords alone for authentication. We are in an era where there is no such thing as a “secure” password; even the most complex password is still a “shared secret” that the application and the user both need to know, and store on servers, for authentication. This makes passwords inherently vulnerable to a myriad of attack methods, including phishing, brute force attacks and malware.

Thursday, April 13, 2017

McAfee Returns to Its Roots After Intel Spin-Out

Steve Grobman with Intelsecurity women team
Steve Grobman with IntelSecurity CTO women! Womensday celebration‏ (Sourced: Twitter)

You remember McAfee? No, not John McAfee, the quaint entrepreneur, but the eponymous cybersecurity company he founded 30 years ago.

Wednesday, March 29, 2017

The insecurities list: 10 ways to improve cybersecurity

improve cybersecurity
10 ways to improve Cybersecurity

 A friend asked me to create a list all of the cybersecurity things that bug me and what he should be diligent about regarding user-security. We talked about access control lists, MAC layer spoofing, and a bunch of other topics and why they importent. You should come up with a list of head-desk things.

Monday, February 13, 2017

Avast releases AVG 2017 suite less than four months after acquisition

AVG Avast 2017 available

In case you're enthused about discovering the most recent news in regards to antivirus arrangements alongside both on the web and disconnected safety efforts, this news will speak to you: Four months prior, Avast procured AVG.

This power move was normal by a few, however not very many individuals were really anticipating that the new organization should discharge another suite so not long after the takeover. To the extent security suites go, four months is a moderately brief timeframe to assemble one.

That conveys us to the current arrival of an AVG 2017 suite including various administrations: AVG AntiVirus Free, AVG TuneUp and AVG Internet Security.

Friday, February 3, 2017

Cybercrime, national security crimes are “increasingly urgent threats” in Colorado, says Department of Justice

US Attorney Bob Troyer
U.S. Attorney Bob Troyer
A new branch under the US Department of Justice will be housed in Denver and take on hacking, terrorism-related matters and other high-profile cases.

The newly created Cyber-crime and National Security Section was announced Thursday by Acting US Attorney Bob Troyer. Troyer said, 
Cybercrime and national security crimes are increasingly urgent threats in the District of Colorado.

The new section will be staffed with six assistant United States attorneys who are experts in investigating and prosecuting cyber-enabled crimes and national security cases and housed under the umbrella of The Colorado US Attorney’s Office’s Criminal Division.

“The attorneys were previously assigned to various sections, including the Special Prosecutions section.  These experts have now come together under one of our four criminal sections to focus on these important Department of Justice priorities,” said, Jeff Dorschner spokesman for The Colorado US Attorney’s Office.

Thursday, January 12, 2017

How to Uninstall McAfee to Install Norton

McAfee security programming ought to be totally expelled from your PC before endeavoring to introduce Norton PC security programs. Having different infection insurance and firewall programs introduced can bring about clashes between the product and leave your PC helpless against dangers. McAfee projects can be uninstalled from your PC's working framework, furthermore require the utilization of an evacuation apparatus.