Login

Register

Login

Register

Day

February 3, 2020
A British community housing charity was conned out of more than $1m in a domain spoofing and contractor impersonation scam. Red Kite Community Housing announced on Tuesday that it had fallen victim to a cyber-scam in which criminals posed as genuine service providers to steal a staggering £932,000. In a statement issued on January 28, Red Kite...
Read More
Today, the convergence of cutting-edge technologies such as block chain technology, big data and artificial intelligence is no longer novel. In recent years, everyone has paid attention to Higgs Boson, which uses the principle of quantum black hole technology, and HGBT, which brings the block chain democratic mechanism to the extreme. The most interesting thing...
Read More
What are the biggest points of contention impeding passage of federal privacy legislation (and 3 other security laws)? Government at any level is infamous for moving at a snail’s pace, as politics, red tape and competing interests often get in the way of progress. Technology, on the other hand, moves at lightning speed.  Unfortunately, this...
Read More
Patrick Donahue, Bloomberg Published 10:46 am EST, Monday, February 3, 2020 Chancellor Angela Merkel’s efforts to rule out a ban on Huawei Technologies Co. have hit a wall of resistance in parliament. While the U.K. and the European Union introduced policies that allow Huawei’s partial participation in next-generation wireless networks, Merkel has failed to forge a...
Read More
Privacy advocates have long called for a federal privacy law and it’s coming…in the mean time, experts say complying with the CCPA will lay the groundwork for future compliance with a federal law. Like revelers packing Times Square on New Year’s Eve waiting for the ball to drop, a close teeming crowd of organizations spent the...
Read More
Fresh of raising an additional $7 million in funding, Concentric has launched a tool that employs deep learning algorithms to enable cybersecurity teams to identify documents and repositories where sensitive data has been stored. Company CEO Karthik Krishnan said the Semantic Intelligence platform takes the place of relying on users to remember where documents containing...
Read More
Avoiding the perilous pitfalls of compliance It’s no secret that Fortune 1000 CISOs struggle with compliance, but the pitfalls that fuel the most fury aren’t typically the ones with regulators (although regulator arguments do come in a close second). No, the battle is often internal, such as fighting over jurisdiction, with the California Consumer Privacy Act...
Read More
FELTON, California, Feb. 3, 2020 /PRNewswire/ — With reference to the report published by the specialists the scope of the global Interactive Kiosk Market was appreciated at US$ 23.11 billion in 2018. It is estimated to reach US$ 41.88 billion by 2025 with a CAGR of 8.9% during the prediction period. An interactive kiosk is a...
Read More
A CISO will spend less than two years in the role before moving onto another endeavor. One of the primary factors behind this alarming turnover rate is the constant stress of the job. In fact, it’s common for a CISO to work nights, weekends and holidays, given that malicious threat actors never truly sleep. Despite...
Read More
An incredible £187,000 was raised for the NSPCC counselling service Childline at the White Hat Ball on Friday January 31 2020. Over 650 guests attended the event, which was hosted by singer and TV personality Peter Andre, at the Royal Lancaster Hotel in London. Guests, including members of the Infosecurity Magazine team, enjoyed a champagne reception...
Read More
Emotet operators are looking to pray on people’s fears tospread malware through malicious emails. In this case, they are using the realhealth crisis of the coronavirus outbreak in China. Using people’s fears to spread malware is not new, andit’s good practice always to be wary of emails that link directly to important currentevents. And since...
Read More
French media is reporting that the Bouygues Group’s construction subsidiary has been hit by a massive ransomware attack. The entire computer network has been affected, and all of the company’s servers shut down. A ransom of 10 million Euros has been requested, and at least 200GB of data already stolen. Source link
Read More
People walk past a sign displayed on a building a Drake University that reads “Road To 2020 Starts Here” on February 2, 2020 in Des Moines, Iowa. Joshua Lott | Getty Images The big tech companies are facing a high-stakes test of their ability to protect their platforms from interference and root out bad actors...
Read More
The FBI has arrested a US defense contractor employee for allegedly taking classified information with him on a secret China trip. Tucson-resident Wei Sun, 48, worked for Raytheon for over 10 years as an electrical engineer on the firm’s missile systems program. As such, the China-born US resident had access to technical data on highly regulated...
Read More
Cyber-criminals behind the Maze ransomware attacks have claimed several more scalps over the past few days, including five law firms and a French industrial giant, all of which are thought to have had sensitive internal data stolen. Brett Callow, a threat analyst with security vendor Emisoft, alerted Infosecurity to the developments over the weekend. The...
Read More
Interested in using hardware security keys to log into online services more securely? Well, now you can make your own from scratch, thanks to an open-source project that Google announced last week. Google has released an open-source implementation called OpenSK. It’s a piece of firmware that you can install on a USB dongle of your...
Read More
WhiteHat Security is one of the pioneers in AppSec. As such, the company was an early advocate for DevSecOps. WhiteHat has been doing annual surveys of the security and developer space for several years. In this year’s survey, the good news is that we are seeing real progress in DevSecOps adoption by developers and security...
Read More
Manchester-based cybersecurity startup protects websites, mobile apps and APIs with revolutionary server-side approach to bot management Manchester, 3rd February, 2020 – Netacea, a provider of bot management solutions, has been ranked a leader in the Forrester New Wave™: Bot Management, Q1 2020 report. Forrester, a top research organisation that provides advice on existing...
Read More
UK law enforcers have tightened the net around the hackers that stole €13m ($14.4m) from one of Malta’s biggest banks, with the arrest of four men last week. Malware planted on the Bank of Valletta’s servers back in February 2019 enabled hackers to transfer the money to accounts in the UK, US, Hong Kong and Czech Republic....
Read More
Estimated reading time: 4 minutes Phishing email still remains one of the top malware propagation medium. Recently, we came across an interesting phishing email containing couple of Jumpshare links pointing to malicious components. Jumpshare is an online file sharing service and often cyber criminals abuse these kind of file sharing services. Upon clicking on one of the links in...
Read More
1 2 3 4
Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


Ads

NATIONAL CYBER SECURITY RADIO

Ads

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW