Andrew S

3,382 Flips | 3 Magazines | 49 Likes | 1 Following | 41 Followers | @LordZa | Cissp and consultant

Large law firms' secret information from big-money clients entice cyberthieves

• Home<br>• In-Depth Reporting<br>• Large law firms' secret information from…<p>Digital Dangers<p>Shutterstock<p>In May, a cyberattack by a ransomware “cryptoworm” known as …

Companies can't keep up with hackers causing cyber security risks and major data breaches in 2017

CLEVELAND -<p>Keeping our personal information out of the hands of thieves is a second-by-second struggle for companies that store those financial and …

Best of the Best: the South Korean school for hackers hitting back against the North

A series of attacks on government agencies, TV and banking networks convinced Seoul to develop an elite cadre of experts to defend the country<p>At the fortified border between South and North Korea, students on a computer hacking course are instructed to peer northwards across a strip of empty land …

Securing Industrial Control Systems Becomes Critical As Manufacturers Add IoT In 2018

More manufacturers are looking to secure IoT applications in 2018, opening up opportunities for the channel around protecting connected, critical …

Machine learning will change jobs

PITTSBURGH–Machine learning computer systems, which get better with experience, are poised to transform the economy much as steam engines and …

Is This How Trump Will Announce He Has Fired Mueller?

<i>This article first appeared on Dorf on Law.</i><p>It’s easy to get overwhelmed by information overload regarding the colorful Trump White House, its …

Sophisticated ‘Triton’ malware shuts down industrial plant in hacker attack

Cybersecurity experts at FireEye have issued a warning after a recent hacker attack caused “operational disruption to critical infrastructure” at an …

Triton

91% of cybersecurity pros fear hackers will use AI to attack their company

Some 87% of companies use artificial intelligence in their cybersecurity strategy, according to Webroot.<p>Building a slide deck, pitch, or …

Artificial Intelligence

Mozilla faces blowback after slipping Mr Robot plugin into Firefox

Yesterday, Firefox users noticed a strange new plug-in popping up in their browsers. A new plug-in called Looking Glass found its way into each instance of the new Firefox Quantum browser. It was disabled by default, but users were still alarmed to see a plugin they hadn’t installed. When they …

Your company's cybersecurity score is as important as its credit rating

In the past, a company's main concern was "Is my partner going to go out of business?" Now, it should include "What's my partner's cybersecurity …

Things to Consider When Calculating the Return on Security Investment

In a world where cyberattacks make headlines on a daily basis, security has become an urgent priority in every aspect of life, especially business. …

Cyber-attacks

Report: Industrial companies are moving toward connected tech, but cybersecurity is being forgotten

A report out from LNS Research points to an accelerating growth in industrial Internet of Things (IIOT) adoption. As companies weigh the business …

Cybersecurity

Hundreds of HP Laptop Models Have Hidden Code That Can Record Your Keystrokes

Hewlett-Packard has released a fix for a problem in its laptops that made it possible to record everything users typed.<p>The privacy issue was …

AI will fuel a new cybersecurity race: Experts

MONTREAL -- Technological advances in artificial intelligence are fuelling a new race between hackers and those toiling to protect cybersecurity …

Artificial Intelligence

How to Create an Anonymous Email Account

It's not easy to be anonymous on the internet. Here's how you can stay hidden even on email.<p>This story originally appeared on PCMag<p>Not long ago, the sharing economy seemed to take over. Privacy was dead, and no one cared. But that was a pre-Snowden era. Now, for some, the need to go truly anonymous …

Girl Scouts to train next generation of cybersecurity, AI, and robotics professionals

The Girls Scouts are continuing their quest to prepare young women for careers in STEM: On Monday, Girls Scouts of the USA and Raytheon announced the …

Artificial Intelligence

Hacked IV Pumps and Digital Smart Pens Can Lead to Data Breaches

Researcher to reveal IoT medical device dangers at Black Hat Europe this week.<p>An attack on a single IV infusion pump or digital smart pen can be …

How To: Create an Evil Access Point with MitmAP

The threat of an evil access point has been around for a long time, and with the rise of open public Wi-Fi, that threat is often overshadowed by how …

Prepare for a worldwide digital transformation

Mobility, cloud computing, the Internet of Things, artificial intelligence and big data analytics are among the most important technologies in the …

Higher Education

WISeKey launches ISTANA PKI for IoT to Secure the Automobile Industry

<b>WISeKey launches ISTANA PKI for IoT to Secure the Automobile Industry</b><p><b>ISTANA PKI Integrates WK QuoVadis PKI with VaultIC hardware Secure Elements</b> …

North Korea can target ‘CRITICAL INFRASTRUCTURE’ in advancing cyber programme

In an exclusive interview with Express.co.uk, CNN military analyst Cedric Leighton detailed how Kim Jong-un’s efforts in the cyber realm have the …

North Korea

Security firm was front for advanced Chinese hacking operation, Feds say

The accused hacked 3 multinational corporations in pursuit of intellectual property.<p>Three men who worked for an Internet security firm in China have …

PayPal Says Personal Data May Be Compromised for 1.6 Million TIO Users

PayPal paid roughly $238 million in cash to acquire bill-payment-services company TIO in a deal that closed in July<p>PayPal Holdings Inc. said Friday that personally identifiable information for roughly 1.6 million users has potentially been compromised at a company it acquired earlier this year.<p>Last …

Personal Data

iOS 11 leaves iOS devices more vulnerable to edge-case attacks, says phone-cracking company ElcomSoft

Changes to the way that Apple protects encrypted iOS backups leave devices more vulnerable to certain types of attack, says ElcomSoft, a Russian company used by law enforcement agencies and others to access iPhones. However, it only applies if the attacker has physical access to the device and can …

Encryption

Why automation is the only way to close the cybersecurity skills gap

Data breaches cost a lot of money, but ongoing breaches cost even more.<p>TechRepublic's Dan Patterson met with Gil Barak, founder and CTO of …

Proposed Senate bill could send execs who conceal breaches to jail

Similar legislation failed to pass in 2015.<p>A re-introduced Senate bill is addressing a timely topic, by making it a crime -- punishable by up to five years in prison -- if companies knowingly conceal a breach of customer information. After a slew of cyber attacks (like the one on Equifax) and news …

Cyber-attacks

Hacking Back Makes a Comeback—But It’s Still a Really Bad Idea

Some politicians want to make it legal for individuals and companies in America to pursue digital assailants.<p>In spite of the billions of dollars …

Automation threatens 800 million jobs, but technology could still save us, says report

New analysis says governments need to act now to help a labor force in flux<p>A new report predicts that by 2030, as many as 800 million jobs could be lost worldwide to automation. The study, compiled by the McKinsey Global Institute, says that advances in AI and robotics will have a drastic effect on …