Security

Cyber Security Reviews – Security will bring to our readers whats happening on the Security scene around the world.

0 Comments
  Product review from www.securgadget.com A panic alarm involves the intentional activation of a device designed to alert the receiving station that an emergency or life-threatening situation is taking place. It is similar to the anti-robbery alarm, but without indicating that a robbery is taking place. The purpose of the panic alarm is to allow
0 Comments
In a panel entitled “Winning the Information Security Job Hunt” at the Black Hat conference in Las Vegas, moderator Kelly Sheridan from Dark Reading asked panelists Dawn-Marie Hutchinson, executive director and executive advisory at Optiv, and Drew Fearson, head of daily operations at NinjaJobs, about whether there is a skills shortage and what is in the
0 Comments
by Maria Varmazis Is your company running G Suite? If so, from August you’ll have the option to enable alerts if Google suspects government-backed hacking attempts on any of your accounts. Since 2012, Google has been alerting individual Google account users if they suspect their account has been targeted by government-backed attackers using any number of
0 Comments
Speaking on “Mental Health Hacks: Fighting Burnout, Depression and Suicide in the Hacker Community” at the Black Hat conference in Las Vegas, the problems that employees can typically face were detailed, as well as solutions that employees and employers can turn to. Christian Dameff, clinical informatics fellow at the University of California, San Diego where
0 Comments
by Mark Stockley For two and a half years someone has been terrorising organisations by breaking in to their networks and infecting their computers with devastating, file-encrypting malware known as SamSam. The attacks are regular, but rarer and more sophisticated than typical ransomware attacks, and the perpetrators extort eye-watering, five-figure ransoms to undo the damage they
0 Comments
The FBI has been forced to post a public service announcement warning of the dangers of unprotected IoT devices. In another sign of the growing threat posed by compromised smart devices, the update late last week claimed that attackers are using them as proxies to maintain anonymity and obfuscate network traffic. Doing so enables them
0 Comments
by Danny Bradbury As concerns mount over DNA privacy, a group of DNA collection and genealogy websites has released a set of best practice guidelines for handling sensitive genetic and family data. Will it give consumers much more protection though? Probably not. 23andMe, Ancestry, Helix, MyHeritage, and Habit worked with the Future of Privacy Forum
0 Comments
A newly discovered adversarial group has been targeting operations in electrical utilities in the US, according to Dragos. The activity group, dubbed RASPITE, has reportedly been active in some capacity since early to mid-2017. Dragos has confirmed that RASPITE is now targeting ICS, specifically electric utilities in the US, Europe, Middle East and East Asia. While
0 Comments
by Lisa Vaas The DOJ announced on Wednesday that three alleged, “high-ranking” members of the notorious Fin7 cybercrime organization have been arrested. According to three federal indictments, Ukrainian nationals Dmytro Fedorov, 44, Fedir Hladyr, 33, and Andrii Kolpakov, 30, are allegedly members of a prolific, professional, highly adaptable hacking group widely known as Fin7, though
0 Comments
A national nonprofit organization, SecureSet Foundation, created by SecureSet Academy, aims to increase diversity in the cybersecurity workforce by offering financial assistance, according to a press release from SecureSet Academy. The creation of the SecureSet Foundation will enable individuals to enhance and build their professional skills in the field of cybersecurity, which will also help
0 Comments
The UK government has pledged £100m to drive digital transformation in the police force, helping it tackle cybercrime and improve its controversial use of biometrics. The home secretary has already approved £70m of the Police Transformation Fund allocation to four projects. A National Enabling Programme will create a unified IT system across police forces to
0 Comments
by Paul Ducklin We’ll start this story right at the end: Users and sysadmins. Patch early, patch often. Vendors and programmers. Don’t store plaintext passwords. In this particular case, the vulnerable devices under attack are Mikrotik routers that haven’t been patched since April 2018. Security researcher Simon Kenin at Trustwave pieced the story together, following
0 Comments
The vast majority of small to medium-sized businesses (SMBs) rank security as their top priority, though less than a third of those organizations have a dedicated IT security professional on staff, according to 2018 SMB IT Security Report, released today by Untangle. More than 350 SMBs worldwide participated in the survey, which attempted to gauge their
0 Comments
The Department of Homeland Security (DHS) has announced the creation of a new cyber-risk management center intended to protect the nation’s banks, energy companies and other industries from potentially crippling cyber-attacks on critical infrastructure, according to agency officials who spoke at the 31 July cybersecurity summit hosted by DHS. DHS Secretary Kirstjen Neilsen led a
0 Comments
Attackers are leveraging a new technique that allows them to run a specious file that looks legitimate but is actually malicious, according to the research team at Cyberbit. The component object model (COM) hijacking technique, usually used for attackers as a persistence mechanism, also has evasive capabilities. A proof-of-concept experiment run by the Cyberbit research
0 Comments
By using the HiBids advertising platform, cyber-criminals have been delivering malicious advertisements to millions of victims worldwide in a large-scale malvertising and banking Trojan campaign, according to researchers at Check Point. These malicious ads can infect the PC or mobile device of the person viewing the ads with malware, such as a crypto-miner, ransomware or a banking
0 Comments
During a 29 July interview on “Face the Nation,” Sen. Jeanne Shaheen (D-N.H.) expressed concern over widespread phishing attacks against the Senate and political parties, according to The Hill. “I don’t know who else is on the list but I do know that we’ve had an experience in our office with people getting phishing emails with
0 Comments
by Lisa Vaas Kurkure is PepsiCo’s finger-licking, lip-smacking, Indian corn puff snack. PepsiCo is happy to tell anybody who’ll listen that it makes Kurkure in state-of-the-art, automated, hygienic, food-safety-award-winning, certified factories. Here’s a 5-minute video of the process on YouTube. As you can see, we’re talking rice meal, edible vegetable oil (palm oil), corn meal,
0 Comments
A new type of NetSpectre attack requires no malware or malicious JavaScript, because it instead attacks victims through network connections, according to researchers at Graz University of Technology. Four scientists at the university have published findings on a new type of Spectre attack in a paper entitled NetSpectre: Read Arbitrary Memory over Network. The paper
0 Comments
by Danny Bradbury Google has cracked down on apps that mine for cryptocurrency, banning them entirely from its official Google Play Store. The company quietly updated its developer policy page with the following statement: We don’t allow apps that mine cryptocurrency on devices. We permit apps that remotely manage the mining of cryptocurrency. The policy