Tuesday, July 14, 2020
Home Tags Information security

Tag: information security

URLHaus is a smash success so far: 100,000 malware sites down

via Peerlyst by Kim Crawley Web malware is huge. The web is now one of the top...

14 Ways to Create a Secure Password in 2019 (That you’ll...

by - Jack Foster Whether you are an individual or a business handling hundreds of pieces of sensitive data....

What is a Hacker?

January 2nd, 2019 - by Andrew Ysasi and guest writer Chris Robert If you are reading this, you may be here to get some validation...

21 Terrifying Cyber Crime Statistics

by VPN Geeks It may not be a nice topic to talk about, but it is essential that the world is aware of the terrifying...

Someone Hacked 50,000 Printers to Promote PewDiePie YouTube Channel

November 30, 2018 Mohit Kumar This may sound crazy, but it’s true! The war for "most-subscribed Youtube channel" crown between T-Series and PewDiePie just took an interesting turn after a hacker...

Digital Rights Management (DRM) White Paper Released

11/2/2018:  Washington, D.C. – Seeking to arm government archivists and records managers with important information and guidance surrounding the protection of rights associated with...

Nine Duties of an Information Security Professional

by Dr. Shuyler Jan Buitron, DCS, MSIA, CISSP, MCSE Throughout my information technology and information security careers, I have encountered many different philosophies and ways...

Here Are 5 Hotel Scams You Should Know About

Identity thieves love to target the hospitality sector because there is a lot of secure records that are collected and stored which include –...

Does Information Security Have a Future?

by Dr. Shuyler J. Buitron, DCS, MSIA, CISSP, MCSE Even though the apparent and hopeful answer to the title question is ‘yes, information security...

Travellers refusing digital search now face $5000 Customs fine in NZ

10:40 am on 1 October 2018 Previously, Customs could stop anyone at the border and demand to see their electronic devices. However, the law did...

Google to shut down Google+

Ben Smith Google Fellow and Vice President of Engineering Published Oct 8, 2018 Many third-party apps, services and websites build on top of our various services to...

Hackers could use fax machines to take over entire networks, researchers...

In an age of instant communication over the internet, the fax machine is seen as an archaic piece of technology. But it could potentially...

Free Thanatos Ransomware Decryption Tool Released

June 26, 2018Swati Khandelwal If your computer has been infected with Thanatos Ransomware and you are searching for a free ransomware decryption tool to unlock or decrypt...

Information Security – $25 Billion Industry

This graphic shows only a sampling of companies in each category.  Data cumulative through March 2018 and collected by Venture Scanner

A Review: Hacked Again

Hacked Again by Scott N. Schober My rating: 5 of 5 stars What I like about this book so much is it is easy to read....

Sacramento Bee Leaks 19.5 Million California Voter Records, Promptly Compromised by...

Last month, a local California newspaper left more than 19 million voter records exposed online. Gizmodo confirmed this week that the records were compromised...

The Privacy Fight Is Dead In DC, And Not Even The...

Despite Republican concerns that the FBI misused the Foreign Intelligence Surveillance Act to gain a warrant to monitor Carter Page, Congress renewed the act less than a month ago.

A comprehensive guide to corporate online surveillance in everyday life

Cracked Labs' massive report on online surveillance by corporations dissects all the different ways in which our digital lives are tracked, from the ad-beacons that follow us around the web to the apps that track our physical locations as we move around the world.

Maersk Reinstalled 45,000 PCs and 4,000 Servers to Recover From NotPetya...

Maersk CEO: "We had to reinstall an entire infrastructure"

US Cities Exposed in Shodan

An in-depth analysis of Shodan data reveals how some of the biggest US cities fare in terms of exposed cyber assets, what this means in terms of security, and how home users and organizations can protect their data.

I’m harvesting credit card numbers and passwords from your site. Here’s...

The following is a true story. Or maybe it’s just based on a true story. Perhaps it’s not true at all. It’s been a frantic...

Forget About Siri and Alexa — When It Comes to Voice...

Ava Kofman via The Intercept January 19 2018, 10:31 a.m. At the height of the Cold War, during the winter of 1980, FBI agents recorded a phone...

The Boards Role in Managing Cybersecurity Risks

Cybersecurity can no longer be the concern of just the IT department. Within organizations, it needs to be everyone’s business — including the board’s.

The Unbreakable Password?

Ever wonder how hard difficult or easy it would be to break your password?  Trying to make a case that your password criteria are...