Login

Register

Login

Register

Day

February 10, 2020
By Zach DeMeyer Posted February 10, 2020 In the enterprise, the ability to instantly terminate Mac®, Windows®, & Linux® user access can mean the difference between smooth sailing and a security breach at the hands of a disgruntled employee. Unfortunately, without cross-OS system management tools, IT departments may not be swift enough to prevent an...
Read More
Last month the Information Commissioner’s Office (ICO), the UK data protection regulator, imposed a monetary penalty notice of £500,000 on electronics retailer DSG Retail Limited (DSG), a company better known by its trading brands, such as Currys PC World and Dixons Travel. DSG is a subsidiary of Dixons Carphone plc.  The personal data breach occurred...
Read More
Express News Service KOCHI: You might have activated ‘Do Not Disturb’ (DND) mode on your mobile phone to keep service SMSes at bay. Yet, your inbox is filled with such messages. Perhaps, your number is among the millions of others that have landed on the dark web. A Kochi-based cybersecurity startup recently found a file...
Read More
Although our research shows that achieving and maintaining PCI compliance builds trust with your customers, it’s all too easy to forget that being found non-PCI compliant could cost you more than your reputation whether or not you’ve suffered a data breach. If your business stores, processes or transmits payment card data then you need to...
Read More
Welcome to Hillicon Valley, The Hill’s newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley. If you don’t already, be sure to sign up for our newsletter with this LINK. Welcome! Follow the cyber team, Maggie Miller (@magmill95), and the tech team, Emily Birnbaum (@birnbaum_e)...
Read More
The University of Maastricht located in the Netherlands experienced a ransomware attack on December 24 and wound up paying the hackers 200,000 euros or $220,000 in bitcoin to unblock its computers, reports Reuters. “The damage of that to the work of the students, scientists, staff, as well as the continuity of the institution, can scarcely...
Read More
SD-WAN deployment has accelerated in recent years as organizations extend SDN benefits across wide area networks. It’s a pretty transformative process, producing new management and cost benefits along with new user experience and performance demands. A few weeks ago I discovered NetBeez, a network monitoring company with a unique, proactive, user-centric approach to monitoring these...
Read More
Look for promotions and discounts to save money. The Internet provides you with a lot of convenience, for with just a few clicks you can do your regular shopping. But what you may not know is that there are ways to make the most of your time and money when you shop online. Here are...
Read More
Welcome to the latest edition of the Future of Security newsletter. Let’s get started: State and local governments can improve confidence in the information posted on their website by encrypting them and shifting to .gov domains, reports Ben Miller, Government Technology’s* business editor. While anyone can obtain a website using .com, .net, or .org, from...
Read More
BOSTON — In 2014, the Obama administration accused five Chinese military agents of targeting Pittsburgh-area industrial companies including Westinghouse Electric, Alcoa and U.S. Steel. Since then, the number of companies allegedly targeted by Chinese hackers has only grown. Chinese President Xi Jinping assured th en-President Barack Obama in 2015 his military would stop stealing commercial...
Read More
An extensive, several-hour-long interruption to Iran’s telecom infrastructure and internet hit that took place on February 8 that was likely caused by a distributed denial of service (DDoS) attack. The non-governmental organization Netblocks reported that at 11:45 a.m. local time Iranian internet connectivity from that country’s primary network operators was down by 25 percent eventually...
Read More
Google has revealed plans to initially warn Chrome users about “insecure” downloads and eventually block them outright. “Today we’re announcing that Chrome will gradually ensure that secure (HTTPS) pages only download secure files,” Joe DeBlasio of the Chrome security team wrote in a blog post. “Insecurely-downloaded files are a risk to users’ security and privacy....
Read More
Sophos investigates RobbinHood ransomware attacks in which cybercriminals use a digitally signed hardware driver to delete security products from computers. by Dan Kobialka • Feb 10, 2020 Sophos, a cybersecurity software provider, is investigating RobbinHood ransomware attacks in which cybercriminals use a digitally signed hardware driver to delete endpoint security products from computers. The RobbinHood...
Read More
Home > Security News > Vulnerabilities Google has issued a critical security update for Android that affects the Bluetooth functionality on about two-thirds of all Android devices now in use. The vulnerability, CVE-2020-0022, affects devices running Android Oreo (8.0 and 8.1) and Pie (9.0) and can allow remote code execution without any user interaction. The...
Read More
Researchers learn how North Korea is expanding its Internet use in order to generate revenue and bypass international sanctions. A new report sheds light on how North Korea’s senior leadership is changing how it uses the Internet, which has evolved into a professional tool its leaders use to generate revenue and evade international sanctions and...
Read More
This regional K-12 public school district’s IT team supports the needs of over 8,000 students and 1,000 staff members The Challenge The Steamboat Springs school district’s IT security team encountered potential compliance and security challenges when it transitioned to Google G Suite for cloud email services, document collaboration, and sharing. Compliance requirements mandate that the...
Read More
The North Miami Beach Police Department was hit with a ransomware attack and is now being told to pay millions to regain access to information it stored online. The department said in a statement Friday that it was impacted by ransomware earlier that week and contacted the FBI, Secret Service and the Miami-Dade Police Department...
Read More
A food technology student threw himself under the wheels of a passenger train after an extreme diet he found on the internet caused his health to deteriorate. Will Mathews, 22, ate only vegetables and fruit after becoming ‘fixated’ with recipes free from carbohydrates and protein he downloaded from a US website.  The Manchester Metropolitan University...
Read More
The U.S. government has indicted four Chinese citizens, accusing them of a huge hack of Equifax. As you might recall, this was the breach that leaked more than 150 million people’s data. The DoJ alleges Wu Zhiyong (吴志勇), Wang Qian (王乾), Xu Ke (许可), and Liu Lei (刘磊) did the dirty deed, and that they’re members...
Read More
On Dec. 26, Canadian Prime Minister Justin TrudeauJustin Pierre James TrudeauUnlikely duo Bill Maher, Megyn Kelly give #CancelCulture scolding it deserves Iran expected to send Ukraine the black boxes from downed passenger plane Poll: Most Canadian taxpayers don’t want to pay for Prince Harry and Meghan Markle’s security costs MORE announced his mandate that Canada’s Minister of...
Read More
1 2 3
Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


Ads

NATIONAL CYBER SECURITY RADIO

Ads

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW