Login

Register

Login

Register

Day

January 13, 2020
Article by Bernard Parsons, CEO, Becrypt Whether it is an EPOS system at a fast food venue or large display system at a public transport hub, interactive kiosks are becoming popular and trusted conduits for transacting valuable data with customers. The purpose of interactive kiosks, and the reason for their increasing prevalence, is to drive...
Read More
Part 3 of Web Series Exploring Unmade Sequel THE POWER OF THE DARK CRYSTAL For many horror aficionados who came of age in the 1980s, The Dark Crystal will always hold a warm spot in our cold, black hearts. Netflix and the Jim Henson Company thrilled fans of the original film (released in 1982) with the prequel...
Read More
Secretary of State Mike Pompeo lambasted China for cybertheft in a policy discussion Monday in Silicon Valley, the heart of American technology. “China has stolen massive quantities of American innovation,” he said at Stanford University’s Hoover Institution, two days before the U.S. is scheduled to sign the first part of a trade deal with the...
Read More
Scammers are using Australia’s bushfire crisis to trick organisations out of thousands of dollars after the disaster sparked a torrent of goodwill, according to InfoTrust. The cybersecurity firm released a warning this morning, saying it is seeing increasing occurrences of attacks by scammers leveraging the bushfire crisis for their benefit, with some hackers gaining access...
Read More
Sources tell KrebsOnSecurity that Microsoft Corp. is slated to release a software update on Tuesday to fix an extraordinarily serious security vulnerability in a core cryptographic component present in all versions of Windows. Those sources say Microsoft has quietly shipped a patch for the bug to branches of the U.S. military and to other high-value customers/targets...
Read More
IT consultancy Entisys360 acquires the cybersecurity technology & support solution assets of Performance Technology Partners (PTP). by Dan Kobialka • Jan 13, 2020 Entisys360, an IT consultant that provides security, IT infrastructure, virtualization, automation and cloud solutions, has acquired the cybersecurity technology and support solutions of Performance Technology Partners (PTP) for an undisclosed sum. This...
Read More
Sources tell KrebsOnSecurity that Microsoft Corp. is slated to release a software update on Tuesday to fix an extraordinarily serious security vulnerability in a core cryptographic component present in all versions of Windows. Those sources say Microsoft has quietly shipped a patch for the bug to branches of the U.S. military and to other high-value customers/targets...
Read More
Federal law requires schools to protect students from inappropriate content. Schools have different standards on what to block, records show. MOUNT HOLLY — Facebook, Snapchat and Twitter are off-limits. Apple TV, Amazon Prime and Hulu video are just fine. At Rancocas Valley Regional High School, cybersecurity systems are set to block student access to social...
Read More
A new study by researchers at MIT, UCL and Aarhus University suggests that most cookie consent pop-ups served to European internet users are likely defying regional privacy laws such as GDPR. The researchers published their findings in a paper titled “Dark Patterns after the GDPR: Scraping Consent Pop-ups and Demonstrating their Influence” which argues that...
Read More
Welcome to the Future of Security. Let’s get started: The election security picture continues to look unsettled. Last week, a study by the University of Michigan found that new voting machines in hundreds of districts lack adequate safeguards to protect against hacking. The study, according to the Washington Post, was an independent review of the...
Read More
By Zach DeMeyer Posted January 13, 2020 The newest iteration of Apple® macOS®, 10.15 or Catalina™, is live. Savvy IT organizations need to stay on top of updates to the OS as they’re released to ensure security. Managing these patches manually as they come in can be tedious, so how can admins automate macOS Catalina...
Read More
As the 2020 election draws near and concerns about Russian interference in U.S. elections grows, U.S. military cyber officials are developing information warfare tactics that could be deployed against Russian officials and private entities, the Washington Post reported. U.S. Cyber Command, or Cybercom, is developing information warfare tactics ranging from subtle warnings to more direct...
Read More
Last week, the internet went dark for Yemen and its 28 million citizens. It’s still not fully back today. In fact, the entire Red Sea region has dealt with slow to nonexistent connectivity since the severing of a single submarine cable on Thursday. It’s popular to think of the internet as a cloud, but it’s...
Read More
New research has heightened an already urgent call to abandon SHA-1, a cryptographic algorithm still used in many popular online services. In a paper called SHA-1 is a Shambles, researchers Gaëtan Leurent and Thomas Peyrin have demonstrated a new, powerful attack on the system that could enable attackers to fake digital certificates for as little...
Read More
The attack may have compromised donors’ payment information. A website gathering donations for the victims of the wildfires in Australia has been hit by a credential-skimming attack, placing the payment information of donors at risk. The attack, identified as the work of Magecart, injected the ATMZOW skimmer into the charity’s website code, grabbed payment information,...
Read More
Windows 7 and Server 2008 will continue to work after Jan. 14, 2020, but will no longer receive security updates. The end of support is near for Windows 7, Windows Server 2008, and Windows Server 2008 R2. All of these will stop receiving security updates and technical assistance after Jan. 14, 2020. Windows 7 end-of-support...
Read More
Anyone searching for a primer on how to spot clever phishing links need look no further than those targeting customers of Apple, whose brand by many measures remains among the most-targeted. Past stories here have examined how scammers working with organized gangs try to phish iCloud credentials from Apple customers who have a mobile device...
Read More
Mobile device management is a crucial component of maintaining a stable security posture, but mobile device management and unified endpoint management tools, one of the more difficult areas of cybersecurity is one of the most difficult areas of cybersecurity. The everchanging and growing threat landscape makes security difficult enough, while the lack of control surrounding...
Read More
Parents writing tuition checks may cling to a hope that the political radicalism of modern academia is largely concentrated in soft majors invented to highlight various grievances. But a new story from one of the world’s best known medical journals confirms that no area of scholarly inquiry is safe. In a book review published over...
Read More
Image: Nick Abrams/BleepingComputer A group tracked as Ancient Tortoise is targeting accounts receivable specialists tricking them into sending over aging reports and thus collecting info on customers they can scam in later attack stages. Aging reports (aka schedule of accounts receivable) are collections of outstanding invoices designed to help a company’s financial department to keep...
Read More
1 2 3 4

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


Ads

NATIONAL CYBER SECURITY RADIO

Ads

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW