Login

Register

Login

Register

Tag

jobs
In the new diplomatic landscape, which can as yet only be dimly seen, old verities going back to 1945 will be rediscovered, writes Tony Kevin.  Woolworths supermarket shelves in Melbourne, Australia, cleared by pandemic buying, March 2020. (Christopher Corneschi, CC BY-SA 4.0, Wikimedia Commons) By Tony Kevinin Canberra, AustraliaSpecial to Consortium News Under current CV19...
Read More
Working professionals across the globe are working from home amid the coronavirus pandemic, and the overstretched IT teams might not be able to upgrade the cybersecurity to match up the risks of remote working Workers are frantically helping teams to work remotely, putting new strains on their computer networks, creating opportunities for hackers to creep...
Read More
The Kaseya-owned Spanning Cloud Apps has announced a new solution that monitors Dark Web for data that may have been stolen from an organisation. The Spanning Dark Web Monitoring solution is a first-to-market Dark Web Monitoring solution for Microsoft Office 365.  It combines backup and restore functionality for Office 365 with Dark Web intelligence and search...
Read More
This Wednesday INSIDER Daily Digest has news on defense contracting amid the COVID-19 pandemic, the Cybersecurity Maturity Model Certification program and more. We start off with Pentagon acquisition officials’ recent actions to make sure the Defense Department can award contracts quickly to combat the COVID-19 pandemic: Defense Department acquisition officials have issued new guidance to...
Read More
KV Sun file photo By Debbie TeofiloSpecial to the Sun Nearly everyone is feeling overwhelmed and stressed by the major life disruptions and fears caused by the coronavirus pandemic. This takes a toll on our physical and mental wellbeing just when we need to be strong to keep the virus at bay. Help is on...
Read More
America’s two oceans that once symbolized an enduring national myth of invulnerability from faraway health disasters and malevolent threats no longer offer any such illusion. Two huge game changers, trans-ocean airliners and a globally-wired-together, AI-empowered Internet of Things, have rendered previous geographical separations and territorial boundary controls defensively impotent against highly-infectious new breeds of biological...
Read More
The various threat intelligence stories in this iteration of the Weekly Threat Briefing discuss the following topics: APT, Data Leak, Mobile Malware, Parallax, TrickBot, and Vulnerabilities. The IOCs related to these stories are attached to the Weekly Threat Briefing and can be used to check your logs for potential malicious activity. Figure 1 – IOC...
Read More
A cybersecurity company has launched a lockdown-friendly hacking competition that doesn’t require any travel or socializing.  Participants of Cyber 2.0’s new Home Hackers Challenge can compete for a cash prize without having to leave their houses.  The competition is open to every hacker in the world, and the premise is simple—the first competitor to break into a...
Read More
An American healthcare provider whose patients’ records were allegedly published online in a ransomware attack has told patients their data is secure. Affordacare runs an urgent care walk-in clinic network out of five locations in Texas. The organization was hit by a ransomware attack in February. In a breach notification published on the organization’s website, Affordacare wrote: “Hackers...
Read More
“Do you know how to buy spliff on Tor?” My pal Ben is not the only one asking where to buy drugs on the so-called dark web. On London’s empty streets, there are whispers about drug dealers shutting up shop, refusing to sell to anyone except their best customers; concerned about their next reload. Like...
Read More
Al Alper is an optimistic man, and someone who believes that “we all do well by doing good.” And he’s used to figuring out how to solve problems. The career path that led him from being a teacher to the owner of two IT and security related firms (Absolute Logic and CyberGuard 360) has taught...
Read More
More ransomware victims than ever before are complying with the demands of their cyber-attackers by handing over cash to retrieve encrypted files.  New research published March 31 by CyberEdge shows that both the number of ransomware attacks and the percentage of attacks that result in payment have increased every year since 2017. The CyberEdge 2020 Cyberthreat...
Read More
The IcedID banking Trojan was discovered by IBM X-Force researchers in 2017. At that time, it targeted banks, payment card providers, mobile services providers, payroll, webmail and e-commerce sites, mainly in the U.S. IcedID has since continued to evolve, and while one of its more recent versions became active in late-2019, X-Force researchers have identified...
Read More
Prime Minister Sanna Marin speaks during a press conference on March 16. Antti Aimo-Koivisto/Lehtikuva/AFP via Getty Images Finnish Prime Minister Sanna Marin has admitted some aspects of the coronavirus management have not gone perfectly in her country, according to the Finnish public broadcaster YLE. At a press conference on Wednesday, Prime Minister Sanna Marin admitted...
Read More
UK businesses could be putting customer data at risk by having a low understanding of important data protection legislation. Research from IONOS has shown that 44% of IT decision makers in the UK do not have a comprehensive understanding of the US CLOUD Act. In contrast, 92% had a comprehensive understanding of the EU’s General Data Protection...
Read More
Chinese conspiracy theories that COVID-19 was some kind of US military bioweapon date back to January, months before a foreign ministry official in Beijing began to spread the same fake news, according to a new study. An analysis from the Stanford University Cyber Policy Center has revealed how fringe conspiracy theories can eventually become weaponized...
Read More
Online threats have risen by as much as six-times their usual levels over the past four weeks as the COVID-19 pandemic provides new ballast for cyber-attacks, according to Cloudflare. The web security and content delivery vendor analyzed UK traffic figures for the past four weeks compared to the previous month and noted a sharp uptick...
Read More
A new partnership has been announced between the National Cyber Security Centre (NCSC) and the IASME Consortium to relaunch the Cyber Essentials Scheme, with IASME as the sole certification body. The NCSC has carried out research, determining the path to certification for Cyber Essentials could be made clearer, that the standard was being implemented consistently...
Read More
A company claiming to provide “the world’s most secure online backup” leaked metadata and customer information in over 135 million records after misconfiguring an online database, Infosecurity has learned. The team at vpnMentor discovered the privacy snafu as part of its ongoing web mapping project that has already uncovered major cloud data leaks at brands...
Read More
Defence SENATOR THE HON LINDA REYNOLDS CSC Minister for Defence Senator for Western Australia ENROLMENTS OPEN FOR NEW ADF CYBER GAP PROGRAM Enrolments are now open for the Australian Defence Force (ADF) Cyber Gap Program, which will provide funding and work experience for students studying a cyber qualification. From July, a pilot program will operate...
Read More
1 2 3 4 81
Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


NATIONAL CYBER SECURITY RADIO
[spreaker type=player resource="show_id=4560538" width="100%" height="550px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]
HACKER FOR HIRE MURDERS
 [spreaker type=player resource="show_id=4569966" width="100%" height="350px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW