Login

Register

Login

Register

Day

January 30, 2020
Some 93% of all mobile transactions across 20 countries were blocked as fraudulent, Upstream says. Criminal groups are increasingly targeting users of Android mobile devices with malware for conducting ad fraud on a massive scale. Mobile security vendor Upstream this week said that in 2019 it identified as many as 98,000 malicious Android apps and...
Read More
What is a compliance audit? A compliance audit is a comprehensive review and evaluation of a business or organization’s compliance with a voluntary compliance framework (e.g., SOC 2) or a regulatory requirement (e.g., GDPR). The scope of a compliance audit depends on which framework/regulation the auditor is evaluating against and, for some frameworks, what type...
Read More
TrustedSec started in the basement of a Northeast Ohio home in 2012. Almost eight years later, the information security consulting firm that breaks into companies’ networks and buildings to keep them safe from nefarious hackers has grown to dozens of employees around the world and is planning to move its headquarters to Fairlawn. “We just...
Read More
Hackers who accessed the payment card information of more than 30 million Wawa customers are now selling the information on the dark web, according to cybersecurity firm Gemini Advisory. (Tampa Bay Times file photo/Tampa Bay Times/TNS) For an average of $17, you can get your hands on credit and debit card data stolen during December’s massive...
Read More
by Alice Duckett This week we discuss 70,000 images being stolen from Tinder, the weleakinfo.com FBI bust and how Sonos annoyed its longstanding customers. Host Anna Brading is joined by Sophos experts Mark Stockley, Greg Iddon and producer Alice Duckett. Listen now! LISTEN NOW Click-and-drag on the soundwaves below to skip to any point in...
Read More
The US Department of Justice has filed lawsuits (PDF and PDF) against two small telecommunications providers that have allegedly connected hundreds of millions of fraudulent robocalls from Indian call centers to US residents. The Feds want a New York federal judge to cut off the companies’ access to the US telephone network. The government says...
Read More
(Reuters) – The FBI is investigating the role of Israeli spyware vendor NSO Group Technologies in possible hacks on American residents and companies as well as suspected intelligence gathering on governments, according to four people familiar with the inquiry. FILE PHOTO: Activists and journalists protest outside the Attorney General’s Office (PGR) after a criminal complaint...
Read More
Qualys Research Labs disclosed this week a security flaw in the OpenSMTPD mail server used within the OpenBSD distribution of Linux that allows a cyberattacker to execute arbitrary shell commands with elevated privileges at a root level. Jimmy Graham, senior director of product management for Qualys, said that OpenBSD flaw is severe enough to warrant...
Read More
Searching Google for “coronavirus” will now send users to a curated search results page with resources from the World Health Organization, safety tips, and news updates, Google and the WHO announced today. This effort, which is just one of Google’s SOS Alerts, is now live. Google also announced a $250,000 direct grant from Google.org, the...
Read More
Preliminary proposals seen as ‘GDPR-lite’ but tough on maliciously identifying people online Doxxing could soon become a criminal offense in Hong Kong, as lawmakers confront a surge in the spread of private information online linked to ongoing anti-government protests. The recommendation, part of a raft of proposals to overhaul the 1996 Personal Data (Privacy) Ordinance...
Read More
The study documents what the researchers call a “surprising disconnect” between the main compliance and data protection stakeholders within leading financial firms. To overcome the resulting deficits, researchers warn, compliance, IT and legal departments “must restore trust and get into sync.” The publication, titled Surprising Disconnect Over Compliance and Secure Web Use at Financial Firms,...
Read More
Gift card scams are on the rise in Gillette with several incidents reported within the last few weeks. Yesterday, a 63-year-old Gillette man told the Gillette Police Department that he received a text from an unknown party, indicating that $350,000 in relief funds would be released to him upon receipt of a $1,500 transfer fee...
Read More
Following the release of an excoriating report written by Joseph Cox at Vice – in which, the good Mr. Cox details the astounding bad-form by anti-virus-flogger-of-ill-repute – Avast, Nicolas Vega a news piece targeting the shutttering of the offending subsidiary by same. ‘…Vlcek and Avast’s board of directors elected to “terminate the Jumpshot data collection...
Read More
Good afternoon. Thank you to SINET for organising this event and thank you to all attendees, especially those colleagues who have travelled from the US. SINET plays an important role in connecting the global cyber ecosystem of innovators, investors and customers – be it private or public sectors. It’s great to have you back here...
Read More
Researchers detail the process of finding two flaws in the Azure Stack architecture and Azure App Service, both of which have been patched. Check Point Research analysts who discovered two vulnerabilities in the Microsoft Azure cloud infrastructure have published the details of how these flaws were found and how attackers could potentially use them. The...
Read More
Competitions for users are a long-time tradition on underground cybercrime forums for members looking for money – and cred with major criminal syndicates. Russian hackers looking to earn a bit of extra cash after the holidays can turn to the cash prizes of a contest on the cybercriminal forum XSS.  The competition, which has been...
Read More
The U.S. Department of the Interior has grounded its fleet of non-emergency drones and halted the use of their associated equipment and software while it checks for cybersecurity issues. The Chinese made drones, which number about 800 according to published reports, are being grounded not for any specific cybersecurity vulnerability, but to give the Interior...
Read More
In the 1990s, web browsers like Netscape Navigator and Microsoft Internet Explorer competed bitterly to offer the snazziest new features and attract users. Today, the browser landscape looks totally different. For one thing, Chrome now dominates, controlling around two-thirds of the market on both desktop and mobile. Even more radical, though, is the recent competitive...
Read More
Check Point Software Technologies revealed today its researchers were able to exploit a flaw to take over servers in the Microsoft Azure Cloud. The flaw in the Azure App Service used to deploy applications could have allowed hackers to bypass the way Microsoft isolates virtual machines to take control of an entire server. The second...
Read More
Facebook has agreed to set aside $550 million to settle a class-action lawsuit brought by users who allege the social media company violated the Illinois Biometric Information Privacy Act (BIPA), attorneys for the plaintiffs announced on Wednesday. San Francisco Federal District Court Judge James Donato must still approve the settlement, which the lawyers claim is...
Read More
1 2 3 4
Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


NATIONAL CYBER SECURITY RADIO
[spreaker type=player resource="show_id=4560538" width="100%" height="550px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]
HACKER FOR HIRE MURDERS
 [spreaker type=player resource="show_id=4569966" width="100%" height="350px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW