0 Comments
A government watchdog has said the Department of Defense has not done enough to protect critical weapons systems from cyberattacks. The new report out of the Government Accountability Office on Tuesday said that the Pentagon has “not make weapon cybersecurity a priority,” and, although there have been some improvements over the years, the department’s “nascent
0 Comments
Cyberattacks have always been, well, cyber. Their immediate effects were on our data, our digital information, and our devices…until they weren’t. The interconnected nature of the world and the way it’s built in 2018 has brought us exciting and revolutionary innovations, but it has also been leveraged by hackers to extend the impact of a
0 Comments
Centrify has spun out its Identity-as-a-Service (IDaaS) service into a new company, which it has named Idaptive. The move will allow Centrify to move its focus to privileged access, as part of its strategy around the zero trust concept, while Idaptive’s offering includes single single-on, adaptive multi-factor authentication, enterprise mobility management and user behavior analytics
0 Comments
A closer look at the technology that is rapidly growing in popularity Blockchain is generally associated with Bitcoin and other cryptocurrencies, but these are just the tip of the iceberg.  This technology was originally conceived in 1991, when Stuart Haber and W. Scott Stornetta described their first work on a chain of cryptographically secured blocks, but only gained notoriety in
0 Comments
The Information Technology industry has seen exponential growth over the years. It is essential for everyone to earn cybersecurity certification if you want to be a part of this growing industry. Organizations always prefer employees with strong internationally-recognized professional certifications. It proofs your skills, knowledge, and gives more credibility to advance your career. IT Certification
0 Comments
Google has dropped out of the running for JEDI, the massive Defense Department cloud computing contract potentially worth $10 billion. In a statement to Bloomberg, Google said that it decided not to participate in the bidding process, which ends this week, because the contract may not align with the company’s principles for how artificial intelligence
0 Comments
Google is about to have its Cambridge Analytica moment. A security bug allowed third-party developers to access Google+ user profile data since 2015 until Google discovered it in March, but decided not to inform users. When a user gave permission to an app to access their public profile data, the bug also let those developers
0 Comments
The United States and UK authorities have joined Amazon and Apple in contesting a blockbuster story last week that Chinese spies implanted tiny chips onto supply chain components used in the tech giants’ products. The Bloomberg story, which cites 17 unnamed sources including three at Apple and four US officials, claimed that the microchips were
0 Comments
A known vulnerability in MikroTik routers is potentially far more dangerous than previously thought. A cybersecurity researcher from Tenable Research has released a new proof-of-concept (PoC) RCE attack for an old directory traversal vulnerability that was found and patched within a day of its discovery in April this year. The vulnerability, identified as CVE-2018-14847, was
0 Comments
Every three months, our team crafts the McAfee Labs Threats Report. The quarterly report ranges in topic and severity but always touches on the most important and impactful threats afflicting consumers and companies alike. This year, the McAfee Labs team analyzed an average of 1,800,000 URLs, 800,000 files and 200,000 high-risk files to produce the McAfee
0 Comments
A regional US fast food chain has become the latest victim of the notorious Fin7 hacking group after a breach of card data involving countless customers. The FBI informed Pacific North West chain Burgerville on August 22 that it had been a target of the group, also known as Carbanak. It was believed that the
0 Comments
Some tips for helping to keep your data more secure from the floor of VB 2018 With the proliferation of more advanced and freely available toolsets, commoditization of attack launch platforms, and availability of wholesale large-capacity network bandwidth for rent, cyberattack velocity is ramping up. If there’s a new vulnerability released you’ll get hit harder
0 Comments
Apple, Amazon and Microsoft have already held their big fall events — and now it’s Google’s turn. Over the past couple of years, the October event has become an increasingly important platform, as the company continues to press into various hardware categories. And really, it’s Google’s last chance to make a big splash ahead of
0 Comments
Officials in the U.S., Canada, U.K. and the Netherlands formally accused seven officers of Russia’s GRU military intelligence agency with cyberattacks targeting individuals and organizations involved in international anti-doping efforts. The GRU indictment from the U.S. Department of Justice (DOJ) charged Aleksei Sergeyevich Morenets, Evgenii Mikhaylovich Serebriakov, Ivan Sergeyevich Yermakov, Artem Andreyevich Malyshev, Dmitriy Sergeyevich
0 Comments
Credential phishing campaigns, in which high-profile individuals are unwittingly falling victim to malicious actors who are looking to gain access into business systems, have proven to be a successful attack vector. According to a new Menlo Security report, Understanding a Growing Threat: Credential Phishing, credential phishing is a quickly growing cyber-attack and is increasingly becoming