Login

Register

Login

Register

Day

February 25, 2020
Speaking at RSA Conference in San Francisco on the subject of “Leading Change: Building a Security Culture of Protect, Detect and Respond,” Lance Spitzner, director of SANS Security Awareness said that we often talk about security culture and the capabilities of the human, but fail to “humanize security.” Spitzner said that the term “you cannot...
Read More
If you use the Firefox web browser, here’s an important update that you need to be aware of. Starting today, Mozilla is activating the DNS-over-HTTPS security feature by default for all Firefox users in the U.S. by automatically changing their DNS server configuration in the settings. That means, from now onwards, Firefox will send all...
Read More
A Massachusetts power station hit by ransomware is refusing to meet attackers’ financial demands. The Reading Municipal Light Department (RMLD) was targeted on Friday by cyber-criminals hoping to extort money by encrypting data in the station’s computer system. Unfortunately for them, station bosses opted to hire an outside IT consultant to help them deal with...
Read More
The United States has long struggled with intellectual property (IP) theft facilitated or condoned by the Chinese government. Just in the past year, a CNBC CFO survey reports that one in five North American corporations have had their IP stolen by China, and just below one-third of CFOs of North American-based companies on the CNBC...
Read More
Introduction Coke versus Pepsi. Mac versus PC. Red versus Blue. There are some arguments that have been around for so long that the idea of one side or the other being 100% correct are slim to none. Each side has its strengths and weaknesses, along with particular use cases. If we try to use one...
Read More
The Software Engineering Institute CERT Coordination Center advised that several ZyXEL network-attached storage devices contain a pre-authentication command injection vulnerability. CVE-2020-9054, if exploited, could allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable device. The problem is it uses the weblogin.cgi CGI executable for authentication and that program fails to properly sanitize...
Read More
The UK’s Financial Conduct Authority (FCA) has admitted exposing the personal data of its critics online.  The FCA, whose job it is to regulate the conduct of the approximately 59,000 financial services firms and financial markets in the United Kingdom, said the data breach was accidental and inadvertent.  Names, addresses, and some telephone numbers of people...
Read More
Take a comprehensive approach to better protect your organization. Security hygiene is a must, but also look at your risk posture through a data protection lens. People have been talking about making the transition to the cloud for more than a decade. The day that happens is no longer in the future: It’s here now....
Read More
Moscow is harnessing the power of facial recognition technology to try to stop the spread of the coronavirus (COVID-19). The city’s mayor said on Friday that the tech was being used in Russia’s capital in an effort to dissuade people placed under quarantine from leaving their home or hotel. In a bid to protect its population of...
Read More
“We need to rethink our culture and shift from a culture of elitism to a culture of inclusion,” said Ghai. His opening keynote called for the information security industry to change its narrative: “to change our future, we must change and spread our story. We need to agree on the story we want and land...
Read More
John Lennon was caught sharing sick fantasies with undercover police officers on the dark web (Picture: Devon and Cornwall Police) A man who saved a cyclist’s life in a suspected terror attack has been unmasked as a paedophile who wrote sick fantasies about raping Madeleine McCann and Alesha MacPhail. John Lennon, 48, from Devon, has...
Read More
Order out of chaos? The saga of Chronicle continues with new security features for the Google Cloud Platform. RSA CONFERENCE 2020 – San Francisco – Chronicle — the once spun-off, now reabsorbed cybersecurity division of Google Cloud — launched a handful of new features at the RSA Conference, which kicked off in San Francisco this week....
Read More
Singapore to offer bug bounty and set up Asean cybersecurity centre Singapore government will launch a bug bounty initiative by end-2018, when local and international hackers will be invited to test systems for vulnerabilities, as well as a cybersecurity hub next year to facilitate collaboration and training efforts amongst Asean country members. Hacking is growing,...
Read More
Speaking at RSA Conference in San Francisco, Wendy Nather, head of advisory CISOs, Duo Security at Cisco, said it is time to consider how users are affected by security controls, why mistakes are being made and if product design really benefits users and security. Nather said that if we thought that IT professionals were the only...
Read More
The number of data breaches that took place around the world in 2019 surpassed all previous years, with a total of 7,098 detected breaches . Although this represents only a marginal increase over the 7,035 breaches documented in 2018, the increase in the total number of records lost is staggering. In 2019, over 15 billion...
Read More
Home > Security News > Vulnerabilities Google issued a patch for CVE-2020-6418 that is currently being exploited in the wild. The vulnerability is a confusion vulnerability in V8, Google Chrome’s open-source JavaScript and WebAssembly engine and rated as a “high” threat by Google. “Google is aware of reports that an exploit for CVE-2020-6418 exists in...
Read More
While there is increased stress in cybersecurity and “good days and bad days,” we should also focus on the “tremendous positives” in the industry’s achievements. Speaking at the Cloud Security Alliance (CSA) summit at the RSA Conference in San Francisco, Phil Venables, board director and senior advisor for risk and cybersecurity at Goldman Sachs Bank, said that despite the challenges, there are 10 reasons...
Read More
Server-side request forgery is a dangerous attack method that is also becoming an issue for the cloud. Here are some of the basics to help keep your Web server from turning against you. When it’s time to talk attacks, it’s hard to get more evil than a technique that uses victims’ own systems against them....
Read More
Phishing attacks have become one of the business world’s top cybersecurity concerns. These social engineering attacks have been rising over the years, with the most recent report from the Anti-Phishing Working Group coalition identifying over 266,000 active spoofed websites, which is nearly double the number detected during Q4 2018. Hackers have evolved their methods, from...
Read More
CoinJoin. Trustless mixing. Anonymity. Bitcoin Magazine’s September 2013 cover — all black with hints of golden fingerprints — needed only four words to announce a powerful new privacy tool. At a time when industry representatives like the Bitcoin Foundation were downplaying Bitcoin’s anonymity features, regulators in New York were developing the BitLicense and Silk Road...
Read More
1 2 3 4
Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


NATIONAL CYBER SECURITY RADIO
[spreaker type=player resource="show_id=4560538" width="100%" height="550px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]
HACKER FOR HIRE MURDERS
 [spreaker type=player resource="show_id=4569966" width="100%" height="350px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW