Month: December 2019

0 Comments
In 2014, the National Institute of Standards and Technology published version 1.0 of its “Framework for Improving Critical Infrastructure Cybersecurity.” Commonly known as the NIST Cybersecurity Framework, its development was in response to Presidential Executive Order 13636 in February 2013: Improving Critical Infrastructure Cybersecurity. Subsequent versions of the NIST CSF appeared in 2017 and 2018,
0 Comments
by Naked Security writer Get yourself up to date with everything we’ve written in the last seven days – it’s weekly roundup time. Monday 23 December 2019 Serious Security: The decade-ending “Y2K bug” that wasn’t Smartphone location data can be used to identify and track anyone Congress passes anti-robocall bill Facebook will stop mining contacts
0 Comments
In this first instalment of the two-article series we will be looking at cybersecurity habits to avoid when using your computing devices As we’re entering 2020, we’re also plotting out our New Year’s resolutions. Instead of suggesting what you should do next year, however, let’s have a look at some cybersecurity mistakes you should avoid
0 Comments
UK police officers and staff reported on average four lost or stolen devices every day over the most recent financial year, according to newly released data. Think tank Parliament Street received Freedom of Information (FOI) requests from 22 forces across the country to better understand their risk exposure from mobiles, tablets, laptops, radios, USBs and other devices.
0 Comments
Summary The activities of some non-governmental organizations (NGOs) challenge governments on politically sensitive issues such as social, humanitarian, and environmental policies. As a result, these organizations are often exposed to increased government-directed threats aimed at monitoring their activities, discrediting their work, or stealing their intellectual property. BRONZE PRESIDENT is a likely People’s Republic of China
0 Comments
Nearly 173 million usernames and passwords were compromised when a leading gaming developer was breached in September, it has emerged. Zynga burst on the gaming scene when its Farmville title became a hit a decade ago. It followed this success with Words with Friends, a hugely popular Scrabble-like word game it acquired. Although Zynga acknowledged
0 Comments
Besides rewarding ethical hackers from its pocket for responsibly reporting vulnerabilities in third-party open-source projects, Google today announced financial support for open source developers to help them arrange additional resources, prioritizing the security of their products. The initiative, called “Patch Rewards Program,” was launched nearly 6 years ago, under which Google rewards hackers for reporting
0 Comments
Wikimedia Foundation, the nonprofit group that operates Wikipedia and a number of other projects, has urged the Indian government to rethink the proposed changes to the nation’s intermediary liability rules that would affect swathes of companies and the way more than half a billion people access information online. The organization has also urged the Indian
0 Comments
Twitter has been forced to suspend thousands of accounts linked to state-backed campaigns driven by Saudi Arabia and designed to influence public opinion, it has revealed. The social networking site claimed in a new blog post on Friday that 5929 accounts had been removed for “violating our platform manipulation policies.” “These accounts represent the core
0 Comments
Since roughly 2012, billionaire Bill Gates has been participating in Reddit’s annual Secret Santa gift exchange, which matches Reddit users with internet strangers who give them presents. He seems to relish the role. For example, in 2017, he was matched with a cat lover, sending off a giant load of feline-themed gifts, including a large
0 Comments
Advanced persistent threats (APTs) have emerged to be legitimate concerns for all organizations. APTs are threat actors that breach networks and infrastructures and stealthily lurk within them over extended spans of time. They typically perform complex hacks that allow them to steal or destroy data and resources. According to Accenture, APTs have been organizing themselves
0 Comments
Modern agriculture involves fields of mind-boggling size, and spraying them efficiently is a serious operational challenge. Pyka is taking on the largely human-powered spray business with an autonomous winged craft and, crucially, regulatory approval. Just as we’ve seen with DroneSeed, this type of flying is risky for pilots, who must fly very close to the
0 Comments
Researchers have unearthed a two-year phishing campaign targeting bank customers in Canada.  Fourteen banks, including CIBC, TD Canada Trust, Scotiabank, and the Royal Bank of Canada (RBC) were spoofed in a large-scale operation that involved multiple look-alike domains.  The attack starts by sending legitimate-looking emails containing a PDF attachment. The attachment uses what appears to