Home Tags Information security

Tag: information security

Chinese hacker group APT5 targets Fortinet and Pulse Secure VPN servers...

Researchers have discovered that a Chinese state-sponsored hacker group known as APT5 is targeting Fortinet and Pulse Secure enterprise VPN servers.

Google And NASA Are ‘Leaking Data’ Via Misconfigured Jira Servers reported...

"I have discovered several such misconfigured JIRA accounts in hundreds of companies. Some of the companies were from Alexa and Fortune top list including big giants like NASA, Google, Yahoo, etc and government sites." - Avinash Jain

Bad Actors are Impersonating CEO’s via Axios

Axios has created a report that shows how bad actors may impersonate CEO's to threaten stock prices, send mixed messages, and possibly divulge intellectual...

Pledges to Not Pay Ransomware Hit Reality

While risk analysts and security experts continue to urge companies to secure systems against ransomware, they are now also advising that firms be ready to pay.

RSA Conference 2019: What You Need to Know by Dan Lohrmann

The 2019 version of RSA Conference in San Francisco has come and gone. Here are some of the product and session highlights, major themes and excellent resources to dig deeper into myriad cybersecurity and technology topics.

Winning Tactics for Becoming a Certified Records Manager (CRM)

So you want to become a Certified Records Manager (CRM)? For those of us in Records and Information Management (RIM), becoming a Certified Records Manager...

Tips of the Month from the Privacy Professor!

by Rebecca Herold Balancing the Good with the Bad  Each month, I try to point out security and privacy "wins" alongside the "fails." After all, if...

URLHaus is a smash success so far: 100,000 malware sites down

via Peerlyst by Kim Crawley Web malware is huge. The web is now one of the top vectors for malware distribution. I took...

14 Ways to Create a Secure Password in 2019 (That you’ll...

by - Jack Foster Whether you are an individual or a business handling hundreds of pieces of sensitive data. There is a mounting requirement to...

What is a Hacker?

January 2nd, 2019 - by Andrew Ysasi and guest writer Chris Robert If you are reading this, you may be here to get some validation...

21 Terrifying Cyber Crime Statistics

by VPN Geeks It may not be a nice topic to talk about, but it is essential that the world is aware of the terrifying...

Someone Hacked 50,000 Printers to Promote PewDiePie YouTube Channel

November 30, 2018 Mohit Kumar This may sound crazy, but it’s true! The war for "most-subscribed Youtube channel" crown between T-Series and PewDiePie just took an interesting turn after a hacker...

Digital Rights Management (DRM) White Paper Released

11/2/2018:  Washington, D.C. – Seeking to arm government archivists and records managers with important information and guidance surrounding the protection of rights associated with...

Nine Duties of an Information Security Professional

by Dr. Shuyler Jan Buitron, DCS, MSIA, CISSP, MCSE Throughout my information technology and information security careers, I have encountered many different philosophies and ways...

Here Are 5 Hotel Scams You Should Know About

Identity thieves love to target the hospitality sector because there is a lot of secure records that are collected and stored which include –...

Does Information Security Have a Future?

by Dr. Shuyler J. Buitron, DCS, MSIA, CISSP, MCSE Even though the apparent and hopeful answer to the title question is ‘yes, information security...

Travellers refusing digital search now face $5000 Customs fine in NZ

10:40 am on 1 October 2018 Previously, Customs could stop anyone at the border and demand to see their electronic devices. However, the law did...

Google to shut down Google+

Ben Smith Google Fellow and Vice President of Engineering Published Oct 8, 2018 Many third-party apps, services and websites build on top of our various services to...

Hackers could use fax machines to take over entire networks, researchers...

In an age of instant communication over the internet, the fax machine is seen as an archaic piece of technology. But it could potentially...

Free Thanatos Ransomware Decryption Tool Released

June 26, 2018Swati Khandelwal If your computer has been infected with Thanatos Ransomware and you are searching for a free ransomware decryption tool to unlock or decrypt...

Information Security – $25 Billion Industry

This graphic shows only a sampling of companies in each category.  Data cumulative through March 2018 and collected by Venture Scanner

A Review: Hacked Again

Hacked Again by Scott N. Schober My rating: 5 of 5 stars What I like about this book so much is it is easy to read....

Sacramento Bee Leaks 19.5 Million California Voter Records, Promptly Compromised by...

Last month, a local California newspaper left more than 19 million voter records exposed online. Gizmodo confirmed this week that the records were compromised...

The Privacy Fight Is Dead In DC, And Not Even The...

Despite Republican concerns that the FBI misused the Foreign Intelligence Surveillance Act to gain a warrant to monitor Carter Page, Congress renewed the act less than a month ago.
Mastodon