;

Top Stories

IoT Security
Equifax just became the first company to have its outlook downgraded for a cyber attack

Equifax just became the first company to have its outlook downgraded for a cyber attack

Mark Begor, CEO of Equifax, testifies during a Senate Homeland Security and Governmental Affairs Subcommittee hearing on Capitol Hill, March 7, 2019 in Washington, DC. Mark Begor, CEO of Equifax, testifies during a Senate Homeland Security and Governmental Affairs Subcommittee hearing on Capitol Hill, March 7, 2019 in Washington, […] Click here to view original...

IoT Security
Facial Recognition Software 101: Current Debates and How to Elude It

Facial Recognition Software 101: Current Debates and How to Elude It

Facial recognition software is a relatively new technological development that is becoming adopted on a large scale by law enforcement agencies and national intelligence agencies worldwide. Theoretically, the adoption of facial recognition software and other biometric identification methods could help identify attacks before they occur and generally lead to a faster capture of criminals. Practically,...

IoT Security
What is SQL Injection?

What is SQL Injection?

SQL Injection is a code injection technique used to attack data-driven applications by inserting malicious SQL statements into the execution field. The database is a vital part of any organization. This is handled by high-level security in an organization. Let us first learn what is SQL. What is SQL? SQL is a structured query language....

IoT Security
Liquid Telecom Launches New Cyber Security Platform in East Africa

Liquid Telecom Launches New Cyber Security Platform in East Africa

Liquid Telecom Kenya, part of the leading pan-African telecoms group Liquid Telecom, has today launched a Microsoft Cloud service in East Africa that offers a step-change in cybersecurity for the region’s most sensitive databases. The new service, named Azure Stack, will allow companies to run a private Microsoft cloud within East Africa, rather than at...

IoT Security
70% of medical devices will be running unsupported Windows operating systems by January: report

70% of medical devices will be running unsupported Windows operating systems by January: report

The number of connected medical devices being used in hospitals and healthcare organizations continues to grow at a rapid pace, representing a vulnerable surface for cyberattacks. Raising the cyberrisks even further, 70% of devices in healthcare organizations will be running unsupported Windows operating systems by January 2020, according to a new cybersecurity report. Microsoft support...

IoT Security
Thirdwayv Announces the AppAuth ™ Cybersecurity Software Platform for Mission-Critical IoT Systems

Thirdwayv Announces the AppAuth ™ Cybersecurity Software Platform for Mission-Critical IoT Systems

Irvine, Calif., and IoT World Conference & Expo 2019, May 13, 2019 – Thirdwayv, a leading provider of end-to-end connectivity and security solutions for IoT applications, today announced it has added AppAuth ™ software to its growing suite of patented products that provide essential layers of security-by-design protection in a wide variety of mission-critical commercial and enterprise Internet...

IoT Security
Category: Vulnerabilities

Category: Vulnerabilities

Microsoft SharePoint Vulnerability Exploited in the Wild May 13, 2019 Via: Security Week A critical vulnerability in Microsoft’s SharePoint collaboration platform has been exploited in the wild to deliver malware. The security hole, tracked as CVE-2019-0604, got its first patch in February and another one in March after the first fix turned out […] Click here to...

IoT Security
A casual approach to workplace communications presents major security risks

A casual approach to workplace communications presents major security risks

Workers are comfortable sharing personal, sensitive and confidential information over chat platforms. They practice risky digital habits, and don’t care if their communications are leaked. Symphony Communication Services Workplace Confidential Survey, which polled over 1,500 workers in the U.S. and U.K., examined the growth of new collaboration tools and platforms entering the workplace. The findings...

IoT Security
Microsoft SharePoint Vulnerability Exploited in the Wild

Microsoft SharePoint Vulnerability Exploited in the Wild

A critical vulnerability in Microsoft’s SharePoint collaboration platform has been exploited in the wild to deliver malware. The security hole, tracked as CVE-2019-0604, got its first patch in February and another one in March after the first fix turned out to be incomplete. Microsoft described the issue as a remote code execution vulnerability caused by...

Hacks and Breaches
How To Effectively Defend Your Business From Cyber Attacks

How To Effectively Defend Your Business From Cyber Attacks

Most small businesses don’t consider themselves to be prime targets of cyber-attacks. This sort of thinking leaves the company open to potential hackers when they realize how easy it is to infiltrate into the company’s…

Hacks and Breaches
Security firm: North Korean hackers shifted focus from causing chaos to acquiring money

Security firm: North Korean hackers shifted focus from causing chaos to acquiring money

  SEOUL, May 23 (UPI) — A group of suspected North Korean hackers seem to have shifted their focus to earning hard currency for the impoverished country since 2016, a global cybersecurity firm said…

Hacks and Breaches
People Are Becoming Indifferent to Data Breaches, Hacks, and Leaks

People Are Becoming Indifferent to Data Breaches, Hacks, and Leaks

The increasing connectivity and digitalization of our everyday lives and business processes are creating a world of new possibilities. At the same time, that world is also becoming more vulnerable. That’s why cybersecurity nowadays…

Hacks and Breaches
Siemens teams up with Alphabet’s Chronicle to protect energy infrastructure

Siemens teams up with Alphabet’s Chronicle to protect energy infrastructure

Siemens AG is teaming up with Alphabet Inc.’s Chronicle LLC subsidiary to secure systems in the energy infrastructure industry. The plan is for Siemens to use Chronicle’s Backstory network security platform to provide more visibility into energy…

Hacks and Breaches
The ‘Unprecedented Challenge’ of Cybersecurity Today

The ‘Unprecedented Challenge’ of Cybersecurity Today

Technological and legal complexities abound in this age of heightened cybersecurity threats—including a rise in state-sponsored hacking. This “unprecedented challenge” was the topic of conversation between Dorian Daley, Oracle executive vice president and general…

Hacks and Breaches
Gaining a Strategic Endpoint Security Advantage in the Era of Advanced Threats: Fileless Attacks

Gaining a Strategic Endpoint Security Advantage in the Era of Advanced Threats: Fileless Attacks

Attackers are in a constant race to update and refine their approach to stay a step ahead of cybersecurity professionals. Recently, cybercriminals have adjusted the delivery mechanism of their “payload” away from traditional attack…

Hacks and Breaches
5 Things Every SMB Should Know to Strengthen Defenses

5 Things Every SMB Should Know to Strengthen Defenses

1. SMBs are attractive targets. While 43% of attacks target small businesses according to SCORE, the 2018 Verizon Data Breach Investigations Report finds that 58% of small businesses have experienced a breach, indicating a high…

Industry
What Is Critical Infrastructure Protection (CIP)?

What Is Critical Infrastructure Protection (CIP)?

The world is changing, and digital and physical systems are converging. Systems that once stood alone managing critical infrastructure operations are connecting to the internet and sharing sensitive data. This new world structure brings with…

Financial
Venture capitalists predict more aggressive security tools will reap big bucks

Venture capitalists predict more aggressive security tools will reap big bucks

A big payday could be in store for cybersecurity startups that borrow ideas from the hackers they’re trying to stop. Cybersecurity vendors that find a way to scale technology that translates offensive security lessons into…

Industry
It’s Past Time for CRE Cybersecurity Strategy and Governance

It’s Past Time for CRE Cybersecurity Strategy and Governance

Cybersecurity, data security and data privacy continue to be hot topics for all market segments, including Commercial Real Estate (CRE) companies. The bottom line is what’s at stake – the company’s financial harm, brand and…

Industry
NYT: Russia is attacking 5G with health disinformation campaigns

NYT: Russia is attacking 5G with health disinformation campaigns

Governments and telecom companies across the world have acknowledged the importance of 5G wireless technologies, but one country — Russia — is quietly attempting to undermine trust in the standard, according to a New York Times report. The newspaper has…

Industry
Electricity Grid Cybersecurity Will Be Expensive – Who Will Pay, And How Much?

Electricity Grid Cybersecurity Will Be Expensive – Who Will Pay, And How Much?

Recently, a neighbor asked one of us whether Russia, China, North Korea and Iran really are capable of hacking into the computers that control the U.S. electricity grid. The answer, based on available evidence, is “Yes.”…

Cyber Security News
Future of the Medical Cyber Security Market: 2019-2025 Forecast and Size Analysis

Future of the Medical Cyber Security Market: 2019-2025 Forecast and Size Analysis

Market Research Pro published a new industry research that focuses on Medical Cyber Security market and delivers in-depth market analysis and future prospects of Medical Cyber Security market. The study covers significant data which makes the research…

Cyber Security News
Researchers develop cybersecurity system to test for vulnerabilities in technologies that use GPS

Researchers develop cybersecurity system to test for vulnerabilities in technologies that use GPS

Southwest Research Institute has developed a cybersecurity system to test for vulnerabilities in automated vehicles and other technologies that use GPS receivers for positioning, navigation and timing. “This is a legal way for us to…

Featured Post

Weeks after being attacked by ransomware, Baltimore government services remain offline

Weeks after being attacked by ransomware, Baltimore...

Government services in Baltimore, Mass. remain crippled by ransomware over two weeks after it the city was first attacked. Government services in Baltimore, Mass. remain crippled by ransomware over two weeks after it the city…

We’re not ready for 2020 hacks: Democrats must press Trump on how the administration intends to protect our voting systems from intrusion

We’re not ready for 2020 hacks: Democrats...

With the 2020 elections fast approaching, America need to be smarter, better focused and more disciplined about defending our elections against foreign interference. This week, Florida Gov. Ron DeSantis ordered a review of the state’s election security…

Paper Ballot Advocates Say They’ll Ask Court To Scrap Ga. Voting Machines Before 2019 Elections

Paper Ballot Advocates Say They’ll Ask Court...

Georgia is one of about a dozen states still using electronic voting machines that produce no paper trail voters can verify for themselves. Cybersecurity experts warn this makes an election system vulnerable. In upcoming elections…

Hacks and Breaches

How To Effectively Defend Your Business From Cyber Attacks

How To Effectively Defend Your Business From...

Most small businesses don’t consider themselves to be prime targets of cyber-attacks. This sort of thinking leaves the company open to potential hackers when they realize how easy it is to infiltrate into the company’s databases…

Security firm: North Korean hackers shifted focus from causing chaos to acquiring money

Security firm: North Korean hackers shifted focus...

  SEOUL, May 23 (UPI) — A group of suspected North Korean hackers seem to have shifted their focus to earning hard currency for the impoverished country since 2016, a global cybersecurity firm said Thursday.…

People Are Becoming Indifferent to Data Breaches, Hacks, and Leaks

People Are Becoming Indifferent to Data Breaches,...

The increasing connectivity and digitalization of our everyday lives and business processes are creating a world of new possibilities. At the same time, that world is also becoming more vulnerable. That’s why cybersecurity nowadays is…

Siemens teams up with Alphabet’s Chronicle to protect energy infrastructure

Siemens teams up with Alphabet’s Chronicle to...

Siemens AG is teaming up with Alphabet Inc.’s Chronicle LLC subsidiary to secure systems in the energy infrastructure industry. The plan is for Siemens to use Chronicle’s Backstory network security platform to provide more visibility into energy company’s…

Cybercrime Joke of the Day

Joke of the day

Security Quotes | Native Intelligence

Joke of Day

JOKE

Cyber Security News and Political Cartoons

Joke of the Day

Cyber Security News and Political Cartoons Click here to view original web page at www.google.com

Cyber Security Offices @ Cyber-Con Center