Login

Register

Login

Register

Day

February 25, 2020
Inmarsat PLC is a British firm that specialises in satellite-based telecommunications. It provides mission critical data and telephone services to users across the globe. The company employs 1,500 people around the world and counts commercial enterprises, governments and humanitarian organisations as its clients. This gives the firm a unique perspective on cyber security. On one hand...
Read More
Ahead of her keynote at the RSA Conference, Cisco’s head of advisory CISOs outlines to Dark Reading a unique paradigm that asks security teams to stop fighting their users — and start sharing control with them. (image by Tiko, via Adobe Stock) RSA CONFERENCE 2020 — San Francisco — End users choosing their own security measures. Kindergarteners...
Read More
Organizations in every industry and at every level of government face more cyberattacks each day. According to Ponemon Institute’s recent research, 68 percent of organizations note an increased frequency of attacks against their endpoints. Often, these threats are zero days, fileless attacks, in-memory exploits, and evasive malware designed to circumvent antivirus and endpoint detection and...
Read More
There are warnings that scammers are taking advantage of the coronavirus outbreak to carry out investment frauds. Such frauds involve claims that a company’s products or services will be used to help stop the COVID-19 epidemic, according to an alert issued by the United States’ Securities and Exchange Commission (SEC). “We have become aware of...
Read More
For years, North Korea’s Lazarus Group hackers have plundered and pillaged the global internet, scamming and infecting digital devices around the world for espionage, profit, and sabotage. One of their weapons of choice: a so-called loader that allows them to clandestinely run a diverse array of malware on targeted Macs with hardly a trace. But...
Read More
There are far more ways to be helpful than adding to the noise of what a company probably did wrong. It’s natural to become angry and indignant when we see a major breach story in the news. Many of these potentially affect us and those we know, and often some concern about a potential vulnerability...
Read More
From left, Council members Mark Meadows, Lisa Babcock, Mayor Ruth Beier, Jessy Gregg, and Mayor Pro Tem Aaron Stephens at the Feb. 18 meeting (photos by Raymond Holt). It looks like East Lansing’s City Council is in for another long night, as today’s agenda is packed from top to bottom. Here are highlights and information...
Read More
Google yesterday released a new critical software update for its Chrome web browser for desktops that will be rolled out to Windows, Mac, and Linux users over the next few days. The latest Chrome 80.0.3987.122 includes security fixes for three new vulnerabilities, all of which have been marked ‘HIGH’ in severity, including one that (CVE-2020-6418)...
Read More
When it comes to cloud infrastructure and implementation, the hybrid cloud option is one that many companies are beginning to latch on to. Overall the most notable element of this realm of security is that it combines the flexibility and customization of a private cloud with the availability of the public cloud. This approach tends...
Read More
At 10:28 pm on November 1, an image of an unknown and classified Pokémon appeared in a Discord group. Gigantamax Machamp, the megasized version of the body-builder Pokémon, was slated to appear in the then-unreleased games Pokémon Sword and Pokémon Shield. Within minutes, JPEGs of it were posted to 4chan. Then, on a dedicated Pokémon...
Read More
It goes without saying that companies migrating IT systems and operations to the cloud face a growing number of challenges related to security. From securing cloud-native applications in a continuous release environment to managing digital identity and remote access to sensitive data, virtually every aspect of day-to-day IT and cybersecurity operations is changing rapidly.  With...
Read More
You are a cybersecurity professional with the responsibility to keep your organization secured, you know your job chapter and verse, from high level reporting duties to the bits and bytes of what malware targeted your endpoints a week ago. But it’s a lot to hold in one’s mind, so to make your life easier, The...
Read More
Editor’s note: Steve Skinner is off this week. This column originally ran in the Aspen Daily News on Sept. 18, 2018.   Social media is the new Wild West and I’ve just been deputized to be the new sheriff in these parts. It’s obvious that many of the great unwashed masses have no clue about...
Read More
Two-fifths (39%) of global companies have suffered a major mobile security compromise over the past year, many of them via IoT devices, according to a new report from Verizon. The vendor’s Mobile Security Index report for 2020 is compiled from interviews with 876 professionals responsible for buying, managing and securing connected devices, as well as...
Read More
New Mexico Attorney General Hector Balderas is suing Google over its alleged slurping of students’ data off of the free Chromebooks it passes out to needy schools and from its free G Suite for Education products, including Gmail, Calendar, Drive, Docs, Sheets, and other apps. According to the complaint, which was filed in the US...
Read More
Christopher Krebs, the first director of the Cybersecurity and Infrastructure Security Agency (CISA), is zeroing in on elections ahead of November. CISA was created out of the former National Protection and Programs Directorate (NPPD) and signed into law by President TrumpDonald John TrumpTrump suggests Sotomayor, Ginsburg should have to recuse themselves on ‘Trump related’ cases...
Read More
OpenSMTPD has been found vulnerable to yet another critical vulnerability that could allow remote attackers to take complete control over email servers running BSD or Linux operating systems. OpenSMTPD, also known as OpenBSD SMTP Server, is an open-source implementation of the Simple Mail Transfer Protocol (SMTP) to deliver messages on a local machine or to...
Read More
Every once in a while, we are asked the question, why should I pay for ProtonMail when I can use Gmail for free? Or why should I pay for ProtonMail when there are cheaper email services available? This is actually a good question worthy of a deeper discussion.  Google isn’t actually free First, it’s important...
Read More
A new survey from SANS has revealed that almost 50% of organizations have a team dedicated to cyber-threat intelligence (CTI). In its 2020 SANS Cyber Threat Intelligence Survey, the education and training provider received 1006 responses from a wide-ranging group of security professionals from various organizations. It discovered that, in many cases, CTI has evolved...
Read More
French sporting retail giant Decathlon has become the latest big brand to expose user data via a misconfigured database, leaking over 123 million records including customer and employee information, according to researchers. A team at vpnMentor uncovered the 9GB database on an unsecured Elasticsearch server. It contained information from Decathlon’s Spanish, and potentially also its UK, businesses....
Read More
1 2 3 4
Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


NATIONAL CYBER SECURITY RADIO
[spreaker type=player resource="show_id=4560538" width="100%" height="550px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]
HACKER FOR HIRE MURDERS
 [spreaker type=player resource="show_id=4569966" width="100%" height="350px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW