Proactive Cyber Security

By Lazarus Alliance | IT Security, IT Audit & Compliance, IT Risk and IT Governance

Cybersecurity professionals aren’t keeping up with training

I’ve written a lot about the cybersecurity skills shortage lately based upon data from a new research report titled, <i>The Life and Times of</i> …

Cybersecurity

Cyber Pro Confirmed as Homeland Security Secretary

The government’s top civilian cybersecurity agency has a permanent leader again more than four months after former Homeland Security Secretary John …

Cybersecurity

DHS Needs to Better Protect Employees’ Sensitive Info, IG Says

An audit found the agency falls short of federal privacy requirements

Government Technology

How to Keep Your Smartphone Secure During Holiday Travel

Whether you're traveling to across the country to see family for the holidays or flying internationally to a tropical locale to escape the winter …

Security

OK, Say Someone Hacks into the US Power Grid. Then What?

“On a scale of 1 to 10,” the threat of a cyberattack on U.S.critical infrastructure is “a 7 or an 8,” the Department of Homeland Security warned …

Cybersecurity

Data breach at PayPal's TIO Networks unit affects 1.6 million customers

PayPal Holdings on Friday acknowledged that a data breach at recently acquired payments processor TIO Networks compromised the personally …

Identity Theft

UK cybersecurity leader calls for government to drop Kaspersky Labs' software

Cybersecurity

Data on 31 million users leaked by smartphone keyboard app

<i>"</i>This breach highlights how vulnerable we are to apps or third-party tools that may be sloppy or reckless with security,” said Roy DeMeo, cofounder …

Phones

Senators call on FCC's Pai to delay net neutrality vote

A letter from 28 Senators to the FCC chairman calls on him to delay its vote on repealing net neutrality over concerns that many of the public …

Senators

Mozilla patches critical flaws in Firefox 57.0.1 update

Mozilla released a security update to address critical vulnerabilities in Firefox 57 which could allow a remote attacker to take control of an …

Mozilla

Hello, Charming Kitten: Alleged HBO hacker, two others possibly linked to Iranian APT group

Researchers with ClearSky Cyber Security believe with medium-level confidence that they have linked three individuals to the Iranian advanced …

Google patches 37 security issues in Chrome

Google issued patches for 37 security issues in Chrome, with one being rated critical and six considered high risks, with the release of Chrome …

Google

Apple releases security updates for multiple products

Apple released security updates to patch vulnerabilities in its iOS, mac OS, tvOS and watchOS platforms.

Apple Watch

Uber paid Florida hacker responsible for breach $100K through bug bounty program

Uber reportedly funneled payment through the program - intended to encourage security researchers to find and disclose vulnerabilities - which is …

Research

Retailers still in need of data breach response plan

Between the holiday shopping season now being in full swing and the growing number of retailers hit with data breaches Tripwire was surprised that a …

Cybersecurity

Most Retailers Haven't Fully Tested Their Breach Response Plans

12/6/2017<br>03:30 PM<p>50%<p>50%<p>More than 20% lack a breach response plan altogether, a new survey shows.<p>Looks like you've hit your article limit. Please or …

Information Security

Nearly 2/3 of Industrial Companies Lack Security Monitoring

12/6/2017<br>03:50 PM<p>100%<p>0%<p>New Honeywell survey shows more than half of industrial sector organizations have suffered cyberattacks.<p>A new survey by LNS …

Cybersecurity

GDPR Compliance Means Transforming Your Data Governance

Data Governance Is at the Core of GDPR Compliance<p>Organizations have until May 25, 2018, to comply with the EU’s new General Data Protection …

Privacy

Hackers Steal $70 Million in Bitcoin

"It was a professional attack"<p>In a theft on the cryptocurrency-mining service NiceHash, hackers made off with nearly $70 million worth of …

Identity Theft

Anatomy of an Attack: CARBANAK

<b>Anatomy of an Attack: CARBANAK</b><p>RSA Incident Response and Discovery Practice (RSA IR) analysts spend a significant amount of time engaged in the …

Cybersecurity

Crack computer systems and pull information from any system... with White Hacker Bundle

Say the word hacker and you’re bound to elicit a response. More often than not, the idea of someone breaking into computer systems and infiltrating supposedly secure networks and devices is viewed as a danger or an evil.<p>However, plenty of hackers are serving on the side of the just and right… and …

Could the security industry have it all wrong?

<i>Originally published on CSOonline.com on August 16, 2017</i><p>For decades, enterprises have focused on securing valuable data and IP by building “walls and …

Cybersecurity

Which of Your Employees Are Most Likely to Expose Your Company to a Cyberattack?

When poet Alexander Pope first said “to err is human,” he probably didn’t realize how prescient those words were in capturing the world of cybersecurity. Yes, the root cause of most security breaches can be traced to human actions, or lack thereof. However, the bigger mistake is to believe that …

Cybersecurity

What is HADES? New 'alternate reality' thwarts hackers by tricking them into believing attack worked

The system has been designed to trick hackers into exposing their tools and techniques.<p>Cyberspace has become the new frontier for next-generation …

U.S. Dept. of Homeland Security

A popular virtual keyboard app leaks 31 million users' personal data

The app maker's database wasn't protected with a password, leaving exposed its users' most private information.<p><i>Video: Google does some explaining</i> …

Security

New CFPB Chief Curbs Data Collection, Citing Cybersecurity Worries

Decision is part of Mulvaney’s effort to improve the agency’s data-security program<p>WASHINGTON—The Trump administration’s interim director of the Consumer Financial Protection Bureau said he has frozen the agency’s collection of personal information due to cybersecurity concerns, a step in changing …

Cybersecurity

100,000-strong botnet built on router 0-day could strike at any time | Ars Technica

New strain of Mirai is sophisticated, locked, and loaded.<p>Attackers have used an advanced new strain of the Mirai Internet-of-things malware to …

Information Security

You Can’t Secure 100% of Your Data 100% of the Time

Over three billion credentials were reported stolen last year. This means that cybercriminals possess usernames and passwords for more than three billion online accounts. And that’s not just social media accounts; it’s bank accounts, retailer gift card accounts with cash and credit cards attached, …

Cybersecurity

How to Keep Your Kids Safe Online

Let’s face it: the internet can be a nasty place. Between predators, malware, explicit content, and other bad actors, parents can find themselves in …

Parenting