Cyber Security

This is where news and updates on Cyber Security are published on a daily basis.

0 Comments
The gig economy has become more prevalent in today’s world with the appeal and necessity of flexible work opportunities. Many take advantage of short-term contracts, side jobs, and freelance work to retain more control over how they spend their day and earn their income. However, the proliferation of these flexible work opportunities has transcended into
0 Comments
Welcome back to This Week in Apps, the weekly TechCrunch series that recaps the latest in mobile OS news, mobile applications and the overall app economy. The app industry continues to grow, with a record 218 billion downloads and $143 billion in global consumer spend in 2020. Consumers last year also spent 3.5 trillion minutes using apps on Android devices
0 Comments
A string of cyber espionage campaigns dating all the way back to 2014 and focused on gathering military intelligence from neighbouring countries have been linked to a Chinese military-intelligence apparatus. In a wide-ranging report published by Massachusetts-headquartered Recorded Future this week, the cybersecurity firm’s Insikt Group said it identified ties between a group it tracks
0 Comments
A councilor from New Jersey has been arrested and charged with waging a campaign of cyber-harassment against a former girlfriend.  Detectives from the Cape May County Prosecutor’s Office, with the assistance of detectives from the Middle Township Police Department, launched an investigation into the activities of 43-year-old realtor and Cape May councilman Christopher Bezaire in May 2021
0 Comments
What is ping sweep (ICMP sweep)? A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers). Whereas a single ping will tell whether one specified host computer exists on the network, a ping sweep consists
0 Comments
A new piece of tech often tops the list of Father’s Day gifts. And while things such as wearable fitness devices, smart speakers, smart outlets, or any number of other connected gadgets and do-dads are popular picks, one thing often gets overlooked—protecting those devices from hacks and attacks.  We live in a day and age when even connected lightbulbs can be hacked. The reality is that
0 Comments
A man from Texas could be facing up to 20 years in prison after pleading guilty to plotting to blow up a data center in Virginia. Seth Aaron Pendley, of Wichita Falls, was arrested in April after trying to purchase what he believed to be an explosive device from an undercover FBI employee in Fort Worth. The
0 Comments
by Paul Ducklin [03’22”] Will quantum cryptography mean the end of encryption?   [10’30”] How was the FBI able to get bitcoins back in the Colonial Pipeline ransomware case?   [25’00”] What is the ALPACA attack, and does it make your browsing less secure?   [25’00”] Oh! No! of the week. With Kimberly Truong, Doug Aamoth and Paul Ducklin. Intro and
0 Comments
As software supply chain attacks emerge as a point of concern in the wake of SolarWinds and Codecov security incidents, Google is proposing a solution to ensure the integrity of software packages and prevent unauthorized modifications. Called “Supply chain Levels for Software Artifacts” (SLSA, and pronounced “salsa”), the end-to-end framework aims to secure the software
0 Comments
More than a billion records were exposed after a misconfiguration error left a CVS Health cloud database without password protection. The 240GB of unsecured data was discovered by WebsitePlanet and security researcher Jeremiah Fowler in a cooperative investigation.  Because of the security oversight by CVS Health, which owns CVS Pharmacy and Aetna, a total of 1,148,327,940 records were exposed. Information
0 Comments
A solid password policy is the first line of defense for your corporate network. Protecting your systems from unauthorized users may sound easy on the surface, but it can actually be quite complicated. You have to balance password security with usability, while also following various regulatory requirements. Companies in the EU must have password policies
0 Comments
The United States has convicted a Russian cyber-criminal of running a malware-masking service that helped hackers systematically infect victim computers around the world with malware, including ransomware. On Tuesday, a federal jury in Connecticut found 41-year-old native Estonian Oleg Koshkin guilty of operating a crypting business via multiple websites, including “Crypt4U.com,” and “fud.bz.” On the websites, Koshkin