Proactive Cyber Security

By Lazarus Alliance | IT Security, IT Audit & Compliance, IT Risk and IT Governance

Australia's car industry needs cybersecurity rules to deal with the hacking threat

It’s common to hear modern cars referred to as computers on wheels. They boast sensors that measure fuel and braking, along with built-in navigation …

Cybersecurity

Landing that infosec job: These experts share their best career advice | ZDNet

ZDNet spoke to four security experts for their top advice in getting into the infosec world.<p>"Hey there! You found us," read the first five words of a …

Employment

Will AI's Security Risks Limit Consumer Adoption?

By 2020, it’s projected that 85 percent of customer interactions will be managed without a human. Currently, machine learning provides a wide range …

Stephen Hawking

IT Security Specialist Super Bundle, Save 98%

We have an awesome deal on the IT Security Specialist Super Bundle in the Geeky Gadgets Deals store today, you can save 98% off the regular price.<p>The …

IT security

Hacker group claims it breached Sony's PlayStation Network and stole information

The backbone of Sony's wildly popular PlayStation 4 video game console is the PlayStation Network. It's the online service that powers Sony's digital storefront, all online gaming on the PS4, and much more. If you're using a PlayStation 4 online in any capacity, you're using PSN.<p>On Sunday evening, …

Security

More Cyber-Attacks Occur on Weekends Than a Weekday, Study Reveals

1 of 9<p>Fortinet released its 28-page FortiGuard Labs Q2 2017 Global Threat Landscape Report on Aug. 21, providing insight drawn from over 3 million …

Cybersecurity

The Pitfalls of Cyber Insurance

Cyber insurance is 'promising' but it won't totally protect your company against hacks.<p>Imagine an insurance market plagued by eye-popping premiums …

Cybersecurity

5 Steps to Website Security You Can Trust - Copyblogger

Website security has never been more critical. Hackers, ransomware, and denial of service attacks are all concerns for modern business …

Content Marketing

Everyone is a target: no firm is too small for cybercriminals

Today, the Chief Information Security Officer (CISO) is indispensable in the boardroom, says McAfee's chief scientist, Raj Samani<p>If there was ever a …

Cybersecurity

Nude Photos Of Tiger Woods, Katharine McPhee & More Leak After Getting Hacked: Stars Threaten Lawsuit

Celeb Jihad better lawyer up! The site has posted nude selfies of hacked stars like Miley Cyrus, Kristen Stewart, Tiger Woods, Katharine McPhee and …

Tiger Woods

'Massive Scandal:' Feds Probing Whether DWS's Arrested IT Aides Sold Sensitive Data to Pakistan and...Russia

If you're playing catch-up on this burgeoning scandal, read Andy McCarthy's summary, and these details of Debbie Wasserman Schultz's bizarre behavior …

Imran Awan

UK intelligence knew British WannaCry researcher would be arrested in Nevada: report

British intelligence officials allowed a security researcher recently hailed as a hero to travel to Nevada, where they knew he would be arrested, in …

WannaCry

Government Hacks Back: US Military Plans Malware Retaliation Against Attackers

The United States government is planning on adapting a new approach to discourage hackers and other malicious actors from attacking government and …

Cybersecurity

Exploits, Hacks, Phishing, Ponzi Are on the Rise on Ethereum

In its essence, Ethereum extended over the Bitcoin payment mean, by adding a rich programming language enabling the execution of smart …

Ethereum

IRS warns of spreading W-2 email theft scheme

The IRS is warning businesses about a sharp increase in email phishing scams involving employees' W-2 forms — scams that can put staffers' Social Security numbers and other critical information in the hands of thieves.<p>The government said 200 businesses, public schools, universities, Native American …

Identity Theft

Sonos says users must accept new privacy policy or devices may "cease to function" | ZDNet

The sound system maker will not allow existing customers to opt-out of the new privacy policy.<p>Sonos has confirmed that existing customers will not be …

Privacy

How To Avoid Legal Trouble When Protecting Client Data

50%<p>50%<p>BLACK HAT USA 2017 -- Karen Neuman and Jacob Osborn of law firm Goodwin LLP visit the Dark Reading News Desk to discuss how cybersecurity …

Information Security

Google is About to Make Your Browser More Paranoid, with More Warnings for Unencrypted Sites

Your browser is about to become a lot more paranoid. You might not notice. But if you do, don't freak out. At least not yet.<p>You may have noticed that …

Home Depot

Bugged replacement screens could be used to hack your smartphone

Gravity is a relentless mistress, one that has wreaked havoc on smartphones of all shapes and sizes over the years. This force of nature is directly …

Ben-Gurion University

Want to improve cybersecurity? Try phishing your own employees

Employees are a company's weakest security link. Here's why running internal phishing attacks can strengthen your cybersecurity posture.<p>More than 90% …

Cybersecurity

Plex changes its new privacy policy after backlash, clarified it’s not trying to see what’s in your library

Popular media player software maker Plex has had a rough weekend. The company alerted users via email on Friday about an updated privacy policy due to go into effect in September. The new policy would remove users’ ability to opt out of data collection, said Plex. This move quickly resulted in much …

Privacy

With Attacks Soaring, India Races to Regulate Cryptocurrencies

A giant cyberattack that crippled India’s largest container port in June provided a costly wake up call for a country determined to digitize its …

India

Permanently delete files from any device

Send your trash beyond the point of no return.<p>When you delete a file from your computer, it doesn't simply disappear from existence—at least, not right away. Even if you immediately empty the Recycle Bin or Trash folder, all your deletion does is earmark the space that file takes up on your hard …

Encryption

3 Cybersecurity Stocks to Buy Now

A hacktivist group that opposes the ­Dakota ­Access Pipeline has commandeered the computer network of a major U.S. airline. The group has given …

Cybersecurity

Trump elevates Cyber Command, setting the stage for NSA separation

Long-awaited move underscores the growing significance of cyber warfare<p>The Trump administration this week elevated the US Cyber Command to a Unified Combatant Command, in a long-awaited move that underscores the growing importance of cyber warfare.<p>The decision, announced Friday, puts the Cyber …

Cybersecurity

6 DNS Must-Do’s for Protecting Your Networks in a Hostile World

Without the Domain Name System, the internet would simply close for business.<p>As the not-so-distant DNS attack on Dyn shows, even good DNS management …

Information Security

WannaCry ransomware attack at LG Electronics takes systems offline | ZDNet

Consumer electronics giant confirms WannaCry was found on a self-service kiosk in South Korea and systems were shut down for two days to prevent …

Information Security

Protect Your Computer with This One Simple Trick

Not to get too click-baity, but there's a single simple trick that will make your PC or Mac much more secure. Believe it or not, it doesn't involve …

Anti-Virus Software

Cybersecurity Just Got Served: How New York Is Setting the New Gold Standard

New York raises the bar with first-in-nation cybersecurity regulation aimed at the financial sector.<p>New York's Department of Financial Services did something of historic importance this month, and it got scant play in the media--fake news or otherwise.<p>It's no wonder. July 2017 tied with 2016 for a …

Cybersecurity