Login

Register

Login

Register

Day

March 6, 2020
COVID-19 is not the only virus associated with the global outbreak. As predictably as night follows day, cybercriminals have been using the epidemic as a means to spread their malicious payloads. Companies should include information about cyber hygiene along with the CDC recommendations of hand washing, particularly given the potential for increased remote access to...
Read More
As the risk of data abuse is on the rise, more and more companies are seeking to adhere to the existing data privacy and regulatory compliances.  From the EU’s General Data Protection Regulation (GDPR) to the recently released California’s Consumer Privacy Act (CCPA), each regulation has a unique strategic imperative.  The European Union’s GDPR came...
Read More
Coronavirus could make remote work the norm, something companies need to knowCOVID-19 coronavirus outbreak could be the catalyst for a dramatic increase in telecommuting. Businesses should be preparing for the rise of remote work and the long-term effects on marketing budgets, corporate travel and commercial real estate. Sixty years ago, research was underway to understand...
Read More
A former FBI counterintelligence chief said the 2020 elections are just the latest target of a Russian government poised to disrupt the U.S. by manipulating voter trust in the system. “They hate all Americans,” retired FBI agent Robin Dreeke said. ”The only agenda they ever had was to sew distrust in the United States.” Dreeke...
Read More
In a coordinated show of force last month, the State Department and the Department of Defense joined more than 20 other nations in attributing and condemning a 2019 cyberattack on the country of Georgia to Russia’s military intelligence wing. The move was part of a broader “name and shame” strategy aimed at slowing cyberattacks from...
Read More
Today Huawei published a video explaining the concept of “backdoors” in telco equipment. Many are criticizing the video for being tone deaf. I don’t understand this concept of “tone deafness”. Instead, I want to explore the facts. Does the word “#backdoor” seem frightening? That’s because it’s often used incorrectly – sometimes to deliberately create fear....
Read More
ttps://pittsburgh.cbslocal.com/”http://www.w3.org/TR/REC-html40/loose.dtd”> PITTSBURGH (KDKA) — The Tree of Life massacre will forever stand as one of the darkest days. But a new documentary, “Viral: Anti-Semitism In Four Mutation,” goes inside the Tree of Life Synagogue for the first time since the 2018 shooting. (Photo Credit: So Much Film) The documentary pairs the police-taped interiors of the...
Read More
It’s hard to tell who’s benefitting most from the coronavirus – Russia, hackers or hand sanitizer vendors, the latter of whom are at least trying to help stop the spread of the dangerous disease. A State Department official told Congress Thursday that Russian operatives are behind coronavirus conspiracy theories popping up on social media while...
Read More
Cyber threats now command the corporate sector’s full attention. It’s reached the point where some CEOs have even begun adjusting their personal online habits to help protect themselves, and by extension, the organizations they lead. Corporate consultancy PwC’s recent poll of 1,600 CEOs worldwide found that cyber attacks are now considered the top hinderance to...
Read More
For the cybersecurity industry International Women’s Day 2020 may be somewhat bittersweet as more women are working in the industry, but when it comes to full equality the work is far from complete. The 2020 edition of this day does find more women working in cybersecurity with about 20 percent of the workforce being female,...
Read More
PwndLocker is harder to detect than other crypto-malware, Crypsis Group says. Researchers have discovered a new ransomware variant that they say has significantly different behavior and characteristics than most other ransomware types. The ransomware, called PwndLocker, was found by The Crypsis Group in February during a client engagement. Subsequent analysis showed it was developed entirely as...
Read More
These are the steps you can take to erase your activity from the Internet’s long memory. You can do it… but should you? monsitj/Getty Images It is possible to make yourself “disappear” from the Internet, says Porch.com security expert Robert Siciliano. But, he warns in an informative post, there isn’t an undo option for many...
Read More
Many if not most organisations have already crossed the “working from home”, or at least the “working while on the road” bridge. If you’re on the IT team, you’re probably used to preparing laptops for staff to use remotely, and setting up mobile phones with access to company data. But global concerns over the current...
Read More
Security pros detail the common and concerning ways attackers target enterprise cloud environments. 1 of 8 As organizations transition to cloud environments, so too do the cybercriminals targeting them. Learning the latest attack techniques can help businesses better prepare for future threats. “Any time you see technological change, I think you certainly see attackers flood...
Read More
SXSW, the annual tech, music, and film meetup held in downtown Austin, is the latest major conference to be canceled due to the coronavirus outbreak, and just one week before it was slated to start. It is the first time in the event’s 34-year history that it’s been canceled. The festival was scheduled to take...
Read More
All Intel processors released in the past 5 years contain an unpatchable vulnerability that could allow hackers to compromise almost every hardware-enabled security technology that are otherwise designed to shield sensitive data of users even when a system gets compromised. The vulnerability, tracked as CVE-2019-0090, resides in the hard-coded firmware running on the ROM (“read-only...
Read More
Department of Homeland Security (DHS) tells MSPs to patch Zoho ManageEngine Desktop Central security vulnerability Here’s the fix. by Joe Panettieri • Mar 6, 2020 Zoho has released a security patch for a vulnerability (CVE-2020-10189) in ManageEngine Desktop Central, a unified endpoint management platform. Many MSPs (managed IT service providers) leverage Desktop Central to remotely...
Read More
Home > Security News > Data Breach The UK telecom and ISP Virgin Media is informing some customers of a data breach that took place when unauthorized persons accessed an incorrectly configured database. Virgin Media, which supplies telephone, TV and internet services in the UK, said names, home and email addresses, phone numbers and in...
Read More
The United States is engaged in an all-out effort to convince the United Kingdom to reject Chinese telecommunications giant Huawei from the country’s fifth-generation wireless infrastructure, warning of the national security risks posed by potential backdoor access by the Chinese Communist Party. Both the Trump administration and the Senate have sent warnings to the U.K.’s...
Read More
Today’s developers are no longer seen as single subject-matter experts. The need for secure, production-ready software, combined with a more rapid software development lifecycle (SDLC), has pushed developers to adopt broader skills across QA, operations, and even security to ensure software is secure in production.  This need to “shift right,” meaning to gain insights from...
Read More
1 2 3
Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


NATIONAL CYBER SECURITY RADIO
HACKER FOR HIRE MURDERS
 

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW