Login

Register

Login

Register

Month

January 2020
According to the 2019 Verizon Data Breach Investigations Report, 62 percent of all data breaches last year involved the use of stolen credentials, brute force, or phishing. Nearly half of these types of breaches were directly attributed to stolen credentials. Stolen credentials are not only a risk through active user accounts, but can be a...
Read More
In a closed-door briefing with Senate aides, the companies described how hacking outfits linked to Iran, criminal groups and other adversaries are growing more sophisticated — and how they could take advantage of a complex web of vulnerable US targets to sow chaos, according to several people familiar with the Jan. 16 meeting. Some of...
Read More
It’s the dark underbelly of the internet, a place where criminals can find drugs, weapons and even new identities. But over the last decade, the dark web has also become a haven for some of the world’s most violent offenders — child predators. “It’s, by far, the most unthinkable abuse anybody can imagine. Bondage, rape,”...
Read More
Getty Security experts are converging on Iowa in an attempt to ensure that the state’s famed caucuses go off without interference, foreign or domestic. But at this point, there’s little indication of immediate threats in Iowa, so to some extent this may be a test run before the Democratic primaries begin in earnest in New...
Read More
With growing enterprise mobility requirements plus highernumbers of remote workers, properly securing mobile and remote users is causingIT security teams to rethink their endpoint security strategies. VPN tunneling enables remote users to benefit from mostperimeter protections. However, full-time VPN enforcement can be difficult.Users may not always follow VPN usage guidelines. And in mobile BYODenvironments, it...
Read More
debug_backtrace reloaded A PHP bug initially dismissed as posing no security threat could potentially enable code execution outside the sandbox in shared-server environments, a new exploit has revealed. Discovered in the popular website language nearly two years ago, the vulnerability can allow attackers to execute arbitrary code by bypassing restrictions implemented using PHP’s . The...
Read More
Cyber threats to reputation are now expanding from government and politics to threaten businesses, … [+] non-profits, and individuals. (Photo by Chesnot/Getty Images) Getty Images With reputation terrorism growing rapidly online in sophistication and scale, “cyber warrior” may be the new preferred title for a company’s chief communications officer. Only a few years ago this...
Read More
Mastercard Wants to Give You Fast Access to Cash Using Only Your Cell Phone Mastercard Cash Pick-Up lets anyone with a cell phone withdraw cash from a nearby ATM, even those without a bank account. More than 32 million households in the United States are “unbanked” or “underbanked,” meaning they either don’t have bank accounts...
Read More
On Thursday, as coronavirus infections spread, the World Health Organization classified the outbreak as a global emergency. On Friday, United States officials placed 195 people in a two-week federal quarantine at a California military base after evacuating them from Wuhan, China. Amid international efforts to contain transmission of the virus, online scammers have already begun...
Read More
Twitter announced a subtle design change to its iOS app today that may go a long way in both making conversations easier to parse and to join. The change, which looks like it’s a change on Twitter’s end that does not require an update, is to the threading feature in the Twitter timeline, which currently...
Read More
Derek Dorresteyn is the COO and Powertrain Development Manager at Damon Motorcycles, a company that is unleashing the full potential of personal mobility for the world’s commuters. With its proprietary electric drivetrain, Damon has developed the world’s safest, smartest, fully connected electric motorcycle employing sensor fusion, robotics and AI. Damon’s all electric, 200mph and 200-mile...
Read More
Blog > Friday Squid Blogging: The Pterosaur Ate Squid New research: “Pterosaurs ate soft-bodied cephalopods (Coleiodea).” News article. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Tags: academic papers, squid Posted on January 31, 2020 at...
Read More
Written by Sean Lyngaas Jan 31, 2020 | CYBERSCOOP With the Iowa caucuses just days away, state election officials from around the country gathered this week in Washington, D.C., to drill for cyberattacks, study ransomware and learn how to work with ethical hackers. The level of collaboration was unthinkable four years ago, when Russia-backed hackers...
Read More
If there’s one open source project with an unashamedly clear focus on security, it’s the OpenBSD operating system. In its own words, its efforts “emphasize portability, standardization, correctness, proactive security and integrated cryptography.” Indeed, numerous sub-projects under the OpenBSD umbrella have become well-known cybersecurity names in their own right, notably OpenSSH – which ships with...
Read More
NSA Security Awareness Posters From a FOIA request, over a hundred old NSA security awareness posters. Here are the BBC’s favorites. Here are Motherboard’s favorites. I have a related personal story. Back in 1993, during the first Crypto Wars, I and a handful of other academic cryptographers visited the NSA for some meeting or another....
Read More
Almost three years after UK citizens voted to leave the European Union the day has arrived when Brexit will take place, but the change is not likely to have an immediate direct impact on that nation’s cybersecurity situation. Two factors will help the cyber status quo be maintained. First there is a transition period in...
Read More
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Secretary Alex Padilla – Secretary of State for the State of California Noah Praetz is an Election Consultant and formerly the Director of Elections for Cook County, State of...
Read More
Jony Fischbein shares the concerns and practices that are top-of-mind in his daily work leading security at Check Point Software. Check Point Software CISO Jony Fischbein has a lot on his plate. Like many CISOs, he juggles the security of multiple corporate departments with thousands of employees, all of whom possess different personalities, security requirements,...
Read More
Two teenage boys from a rural community in Devon bought illegal drugs from the dark web and sold them to children, including a 15-year-old girl who died after taking ecstasy. The pair, aged 14 and 15, purchased the drugs using the cryptocurrency bitcoin and passed them on to children as young as 12. Among the...
Read More
A new study of stolen passwords reflects the consequences of password overload. The most common type of password is a name, and the most common name password is George, according to a new analysis of compromised credentials found in the Dark Web. ID Agent, a Kaseya company, found that names account for nearly 37% of...
Read More
1 2 3 83
Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


Ads

NATIONAL CYBER SECURITY RADIO

Ads

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW