Login

Register

Login

Register

Day

January 14, 2020
An app designed to record and share milestones in a child’s development has leaked thousands of images and videos of babies online. Bithouse Inc., the developer of the Peekaboo Moments app, failed to secure a 100 GB Elasticsearch database containing more than 70 million log files dating from March 2019. As a result, information including...
Read More
As the House Intelligence Committee held impeachment hearings last fall, members of the Russian GRU, known as Fancy Bear, successfully hacked Burisma, the Ukrainian energy company at the center of the impeachment investigation. In an echo of the 2016 presidential election cycle where Russian hackers pilfered and released damaging emails on then candidate Hillary Clinton...
Read More
TCL’s 65-inch Series 6 TV is seeing a hefty price drop at Best Buy (via Slickdeals). Normally $699.99, it’s now $594.99 if you use the offer code TCLDOLBY15 at checkout (underneath where you put in your credit card number for the payment). This is the 2019 version of TCL’s 6 Series; its 2018 version was...
Read More
Four months after fleeceware’s initial exposure, Android users who purchase “subscriptions” to apps from the Google Play Store are still at risk of being ripped off. Fleeceware hit the news in September 2019, when researchers at SophosLabs showed how some app publishers were using a sneaky business model to drastically overcharge Android users for basic services. ...
Read More
Microsoft is ending support for Windows 7 and Server 2008 today leaving millions of users in the unenviable position of either having to pay to upgrade to the newest OS Windows 10 or face using an unsecured computer. Microsoft announced in June 2019 it would be phasing out support for Windows 7 on January 14,...
Read More
Authentic8, the maker of Silo, the leading web isolation platform for commercial and government organizations, announced today that it has completed all requisite steps and is formally “In Process” for FedRAMP authorization. What Is FedRAMP? The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide certification program that standardizes the security, reliability, and integrity...
Read More
For nearly six months, an attack group linked to Iran reportedly had access to the network of Bahrain’s national oil company, Bapco, before it executed a destructive payload. On December 29, a group of attackers used a data-deleting program known as a “wiper” to attempt to destroy data on systems at Bahrain’s national oil company,...
Read More
A Texas man has been arrested on suspicion of sending perverse and threatening text messages to real estate agents across America. Lubbock resident Andy Castillo allegedly used multiple phone numbers and an app to mask his identity when cyber-stalking as many as 100 realtors in up to 22 different states.  The 56-year-old is accused of sending...
Read More
Adobe today released software updates to patch a total of 9 new security vulnerabilities in two of its widely used applications, Adobe Experience Manager and Adobe Illustrator. It’s the first Patch Tuesday for the year 2020 and one of the lightest patch releases in a long time for Adobe users. Moreover, none of the security...
Read More
A letter to 25 companies says Consumer Reports will change ratings to reflect stronger security and privacy standards. Consumer Reports has issued a letter to 25 connected camera manufacturers, urging them to adopt stronger security and privacy measures for cameras, doorbells, and security systems. The letter is directed to companies including ADT/LifeShield, Guardzilla, Honeywell Home,...
Read More
Good morning, NBC News readers. Russian spies are at it again, the queen gives her reluctant blessing to Harry and Meghan’s plan, and LSU caps a stunning season with a win over Clemson to capture the national title. Here’s what we’re watching this Tuesday morning. Russian spies hacked Ukrainian energy company at heart of impeachment...
Read More
WEST LAFAYETTE, Ind. — Purdue University’s College of Engineering online graduate engineering programs were ranked third, up two spots, in U.S. News & World Report’s latest ranking of Best Online Programs. The report lists the College of Engineering online master’s degree programs as third nationally among the 93 colleges and universities ranked. Purdue was fifth...
Read More
Two days ago, I finally gave up Windows 7. I don’t dislike Windows 10, but there’s just always been something special about Windows 7. It was svelte. It actually ran faster and took up less hard drive space than its predecessor, the much-maligned Windows Vista. It looked great. We Windows users could finally hold our...
Read More
Cyber Warfare Hacking Attack Threat 3d Illustration Shows Government Internet Surveillance Or Secret … [+] Online Targeting Getty Let’s cut right to the chase:  the number of severity of cyberattacks will explode in 2020.  Cyberwarfare has now leveled the playing field in industry, in government, and in national defense:  why spend ten or fifteen billion dollars on an...
Read More
Meltdown, Spectre exploits will likely lead to customers making tradeoffs between performance and security of applications, especially virtual and cloud-based apps Back in January 2018, a consortium of security researchers from organizations including Google, Cyberus Technology and several universities disclosed two ominously-named vulnerabilities found in nearly all modern computer processors. These vulnerabilities broke open the...
Read More
It’s the end of support this week for Windows 7 and Server 2008. But what if you truly can’t migrate off software, even after security updates stop coming? (image by MR, via Adobe Stock) Support for Windows 7 and Server 2008 will officially end after today. That means shops running anything on these OSes will...
Read More
There is a person in every organization that is the direct owner of breach protection. His or her task is to oversee and govern the process of design, build, maintain, and continuously enhance the security level of the organization. Title-wise, this person is most often either the CIO, CISO, or Directory of IT. For convenience,...
Read More
Introduction As modern shoppers, their expectations and mobile technologies are constantly evolving, the payments industry with newer techniques cannot fall behind. The role of the mobile point of sale is undeniable in the contemporary shopping/purchase journey scenarios. Ideally, an mPOS is a mobile device in the form of an iPad, Android tablet, smartphone or a...
Read More
After nine Star Wars movies, two Star Wars stories, and countless TV show episodes, The Mandalorian has finally given us something utterly priceless. No, not Baby Yoda—although, yes, I would die for that damn thing. I refer to the Mandalorian himself: a protagonist who finally understands military tactics. He’s an expert at cover and concealment....
Read More
Organizations need to apply mitigations for vulnerability in Citrix Application Delivery Controller and Citrix Gateway ASAP, security researchers say. Organizations that have not yet applied recommended mitigations for a recently disclosed remotely exploitable flaw in the Citrix Application Delivery Controller (ADC) and Citrix Gateway products now have a very good reason to do so immediately....
Read More
1 2 3 4
Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


NATIONAL CYBER SECURITY RADIO
[spreaker type=player resource="show_id=4560538" width="100%" height="550px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]
HACKER FOR HIRE MURDERS
 [spreaker type=player resource="show_id=4569966" width="100%" height="350px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW