Tag: information security
Chinese hacker group APT5 targets Fortinet and Pulse Secure VPN servers...
Researchers have discovered that a Chinese state-sponsored hacker group known as APT5 is targeting Fortinet and Pulse Secure enterprise VPN servers.
Google And NASA Are ‘Leaking Data’ Via Misconfigured Jira Servers reported...
"I have discovered several such misconfigured JIRA accounts in hundreds of companies. Some of the companies were from Alexa and Fortune top list including big giants like NASA, Google, Yahoo, etc and government sites." - Avinash Jain
Bad Actors are Impersonating CEO’s via Axios
Axios has created a report that shows how bad actors may impersonate CEO's to threaten stock prices, send mixed messages, and possibly divulge intellectual...
Pledges to Not Pay Ransomware Hit Reality
While risk analysts and security experts continue to urge companies to secure systems against ransomware, they are now also advising that firms be ready to pay.
RSA Conference 2019: What You Need to Know by Dan Lohrmann
The 2019 version of RSA Conference in San Francisco has come and gone. Here are some of the product and session highlights, major themes and excellent resources to dig deeper into myriad cybersecurity and technology topics.
Winning Tactics for Becoming a Certified Records Manager (CRM)
So you want to become a Certified Records Manager (CRM)? For those of us in Records and Information Management (RIM), becoming a Certified Records Manager...
Tips of the Month from the Privacy Professor!
by Rebecca Herold
Balancing the Good with the Bad  Each month, I try to point out security and privacy "wins" alongside the "fails." After all, if...
URLHaus is a smash success so far: 100,000 malware sites down
via Peerlyst by Kim Crawley
Web malware is huge. The web is now one of the top vectors for malware distribution. I took...
14 Ways to Create a Secure Password in 2019 (That you’ll...
by - Jack Foster
Whether you are an individual or a business handling hundreds of pieces of sensitive data. There is a mounting requirement to...
What is a Hacker?
January 2nd, 2019 - by Andrew Ysasi and guest writer Chris Robert
If you are reading this, you may be here to get some validation...
21 Terrifying Cyber Crime Statistics
by VPN Geeks
It may not be a nice topic to talk about, but it is essential that the world is aware of the terrifying...
Someone Hacked 50,000 Printers to Promote PewDiePie YouTube Channel
November 30, 2018Â Mohit Kumar
This may sound crazy, but it’s true!
The war for "most-subscribed Youtube channel" crown between T-Series and PewDiePie just took an interesting turn after a hacker...
Digital Rights Management (DRM) White Paper Released
11/2/2018: Washington, D.C. – Seeking to arm government archivists and records managers with important information and guidance surrounding the protection of rights associated with...
Nine Duties of an Information Security Professional
by Dr. Shuyler Jan Buitron, DCS, MSIA, CISSP, MCSE
Throughout my information technology and information security careers, I have encountered many different philosophies and ways...
Here Are 5 Hotel Scams You Should Know About
Identity thieves love to target the hospitality sector because there is a lot of secure records that are collected and stored which include –...
Does Information Security Have a Future?
by Dr. Shuyler J. Buitron, DCS, MSIA, CISSP, MCSE
Even though the apparent and hopeful answer to the title question is ‘yes, information security...
Travellers refusing digital search now face $5000 Customs fine in NZ
10:40 am on 1 October 2018
Previously, Customs could stop anyone at the border and demand to see their electronic devices. However, the law did...
Google to shut down Google+
Ben Smith
Google Fellow and Vice President of Engineering
Published Oct 8, 2018
Many third-party apps, services and websites build on top of our various services to...
Hackers could use fax machines to take over entire networks, researchers...
In an age of instant communication over the internet, the fax machine is seen as an archaic piece of technology. But it could potentially...
Free Thanatos Ransomware Decryption Tool Released
June 26, 2018Swati Khandelwal
If your computer has been infected with Thanatos Ransomware and you are searching for a free ransomware decryption tool to unlock or decrypt...
Information Security – $25 Billion Industry
This graphic shows only a sampling of companies in each category. Data cumulative through March 2018 and collected by Venture Scanner
A Review: Hacked Again
Hacked Again by Scott N. Schober
My rating: 5 of 5 stars
What I like about this book so much is it is easy to read....
Sacramento Bee Leaks 19.5 Million California Voter Records, Promptly Compromised by...
Last month, a local California newspaper left more than 19 million voter records exposed online. Gizmodo confirmed this week that the records were compromised...
The Privacy Fight Is Dead In DC, And Not Even The...
Despite Republican concerns that the FBI misused the Foreign Intelligence Surveillance Act to gain a warrant to monitor Carter Page, Congress renewed the act less than a month ago.