NITSIG Cyber Security Awareness Guide 2018

By Jim Henderson | Produced By: National Insider Threat SIG

Google Chrome Plug-In Informs You Whenever Hackers Have Your Password

But can they ward off hackers themselves?

DHS Detects Cell-Phone Spy Gear in DC

DHS Detects Cell-Phone Spy Gear in DCThe Department of Homeland Security (DHS) has detected equipment that can eavesdrop on cell-phone conversations …

US military reviewing security practices after fitness app reveals sensitive info

<b>Washington (CNN) —</b> The US Central Command says it's in the process of refining its privacy policies after it was reported that a fitness tracking app that maps people's exercise habits could pose security risks for security forces around the world.<p>Strava, which bills itself as "the social network …

Fitness Technology

Online Advertising: Hackers' Little Helper

<b>Network of Fake Ad Agencies Distributed 1 Billion Bad Ads, Researchers Find</b><br>The web may be largely funded thanks to online advertising, but the threat …

Social Issues

Roll back time when users click on a bad link with our new free tool, Second Chance!

Wouldn't it be great if your users had a way to "roll back time" when they forgot to think before they click on a bad link? Now they can!

An analysis of 120 mobile app stores uncovers plethora of malicious apps

RiskIQ analyzed 120 mobile app stores and more than 2 billion daily scanned resources. In listing and analyzing the app stores hosting the most …

Apps

Pentagon data leak: Massive trove of global social media data left accidentally exposed online

The data exposed included social media posts made by people across the globe, including the US.<p>The Pentagon accidentally exposed classified US …

Surveillance Cameras Made by China Are Hanging All Over the U.S.

Company 42%-owned by the Chinese government sold devices that monitor U.S. Army base, Memphis streets, sparking concerns about cybersecurity<p>The Memphis police use the surveillance cameras to scan the streets for crime. The U.S. Army uses them to monitor a base in Missouri. Consumer models hang in …

U.S. Army

Dark Web Marketplace Offers Remote Access to Corporate PCs for $3-15 Each

SECURITY DAILY NEWSLETTER<p>GET SECURITY NEWS IN YOUR INBOX EVERY DAY<p>| NewsLetter Submission<p>By submitting your information, you agree that …

RemoteAccess

Ransomware Sales on the Dark Web Surged by 2,502 Percent in the Past Year

SECURITY DAILY NEWSLETTER<p>GET SECURITY NEWS IN YOUR INBOX EVERY DAY<p>| NewsLetter Submission<p>By submitting your information, you agree that …

Cybersecurity

Does Windows 10's Security Boost Make Antivirus Obsolete?

Microsoft Windows Defender Security Center gets new features with the Fall Creators Update, but the best third-party antivirus tools are still better.<p>…

How Humans (and Machines) Can Help Fight Phishing

How Humans (and Machines) Can Help Fight PhishingWhen it comes to battling cyber-attacks, many starting as phishing emails, we’re naturally inclined …

Massive 711 Million Emails and Passwords Dumped and You Are Probably on the List…I was

A malware researcher going by the Twitter handle, Benkow moʞuƎq, has uncovered a huge stash of emails and passwords stored on an open server in The …

What is a fileless attack? How hackers invade systems without installing software

"We see it every day," says Steven Lentz, CSO at Samsung Research America. "Something coming through, some exploit type, unknown ransomware. We've …

Malware

Report: Negligent employees are no. 1 cause of cybersecurity breaches at SMBs

Careless workers and poor passwords have led to a rise in ransomware attacks and other breaches on SMBs, which cost an average of $1 …

Hundreds of privacy-invading apps are using ultrasonic sounds to track you

Apps are using ad-tracking audio signals that your phone can hear, but you can't.<p>A new privacy-busting technique that tracks consumers through the …

Equifax Says Cyberattack May Have Affected 143 Million in the U.S.

Equifax, one of the three major consumer credit reporting agencies, said on Thursday that hackers had gained access to company data that potentially compromised sensitive information for 143 million American consumers, including Social Security numbers and driver’s license numbers.<p>The attack on the …

Identity Theft

Canadian university scammed out of $11.8 million

MacEwan University in Edmonton, Alberta, is the latest confirmed victim of scammers.<p>“On Wednesday, August 23, MacEwan University discovered it had …

Locky Returns via Spam and Dropbox-Themed Phishing Attacks

Massive Ransomware Campaign Flings 23 Million Emails in Just 24 Hours Mathew J. Schwartz (euroinfosec) • September 1, 2017<p>A new attack campaign has …

Ransomware

100% of government IT workers said employees are biggest threat to cybersecurity

Only 14% of government organizations consider themselves to be well-protected against cyber threats, according to a report from Netwrix. Here's …

How Endpoint Security Can Help Secure the Human

Hackers use a wide variety of tactics to enter networks and often that means finding a human to dupe.

New Study: Phishing Is Still The Top Threat Faced By Organizations

The new 2017 SANS Threat Landscape survey from the well-known research and education specialist finds that security professionals rate phishing at 72 …

Inside the New York hospital hackers took down for 6 weeks

The medical industry is the new No. 1 target for hackers. Almost all U.S. health care organizations have reported at least one cyberattack. The …

Cybersecurity

Techniques for Dealing with Ransomware, Business Email Compromise and Spearphishing

Ransomware alone cost organizations an estimated $1 billion in 2016, up from $24 million in 2015 and there is no end in sight for 2017! Ransomware, …

Hackers impersonate women online to get into target corporate networks

By all (online) accounts, Mia Ash was a pretty and successful photographer based in London, and she was looking for friendship and love on the …

Every organization is only one click away from a potential compromise

Information security staffs are so single-minded about defending their organizations from external attack that they all but ignore a threat with …

Outsider or Insider: Who Will Cause Today's Data Breach?

In today’s cybercrime landscape, threats come not only from all sides, but also from within. In its annual Threat Intelligence Index, IBM X-Force …

What is a 'smishing' scam?

Phishing and Social Engineering Cause Over Half of Cyber Incidents

The Business Continuity Institute (BCI) has called for improved user education and cyber resilience after revealing that nearly two-thirds (64%) of …