Cyber security - Hacking

By paulvalach | paulvalach created a magazine on Flipboard. “Cyber security - Hacking on Flipboard” is available with thousands of other magazines and all the news you care about. Download Flipboard for free and search for “paulvalach”.

Here's What Hackers Don't Want You to Know

Cybercrime is getting worse. Keep your company safe by following the latest recommendations in network security.<p>Surely at this point in time we all know that cybercrime is a serious issue that affects everyone. We've heard all about password hygiene, hacking that comes from third-party vendors, and …

Cybersecurity

9 Factors To Ensure Your Cybersecurity Policy Works For Your Staff, Not Against Them

Companies and organizations are still struggling to deal with ransomware, a cyberattack in which user data is encrypted and held hostage, supposedly until a ransom is paid. This trend looks set to continue and perhaps even intensify. I often get asked by executive management about what they should …

Even the best passwords are no match for this simple hack

Why go to all the trouble of breaking into an online account when you can just ask for the keys?<p>While security experts released new password recommendations this summer, legions of hackers long ago realized that getting into a victim's email or iCloud doesn't require keyloggers, zero days, or USBs …

Security

The unknown hackers

Open-source pioneers Bill and Lynne Jolitz may be the most famous programmers you've never heard of.<p><b>N</b>ot many Linux-come-latelies know this, but Linux was actually the <i>second</i> open-source Unix-based operating system for personal computers to be distributed over the Internet. The first was 386BSD, …

Linux

A cybersecurity expert on why you should be very worried about the internet’s future

"It will take the attention of the free society that built the internet to save it." —Alexander Klimburg<p>In 2012, the New York Times’s David Sanger broke a bombshell story detailing a joint US-Israel cyber attack on Iran that undermined its nuclear enrichment facilities. The computer virus, dubbed …

Cybersecurity

Reputation is Cyber Security is Digital Marketing

The connection between one's reputation, whether an individual or company/organization; and cyber security is real and persistent. The more that one connects to devices, and connects those devices to the internet and social networks the more this becomes true. This is exponentially true for …

Cybersecurity

The ultimate plain English guide to cybersecurity buzzwords

Words like worm, trojan horse and zombie may seem like the stuff of science fiction, but they’re part of the reality of life online.<p>Now that we communicate, work and entertain ourselves on the internet, these familiar terms start to take on new meaning. They’re just a few of the cybersecurity …

Cybersecurity

NSA Chief Mike Rogers Is Not Here for Trump and Putin's 'Impenetrable Cyber Security Unit'

President Donald Trump, whose recent uses of the internet have included hinting he might just pardon himself and everyone else in his administration …

Cybersecurity

China WhatsApp crackdown only scratches surface of worsening internet censorship

<b>Hong Kong (CNN) —</b> As Liu Xiaobo, the Chinese Nobel Peace Prize laureate, lay dying in a heavily-guarded hospital last month, there was little mention of his fate in China.<p>For many younger Chinese, Liu is an unknown figure, the culmination of years of intense censorship of his life and works. The …

How To Steal A Phone Number (And Everything Linked To It)

Someone impersonating you to an AT&T or Verizon employee isn’t the only thing you need to worry about. Meet Signaling System 7, a hacker’s best friend.<p>Last spring, Dena Haritos Tsamitis left a work meeting to discover she was unable to get a signal on her cellphone. Even after rebooting the device, …

Security

Google can tell which apps are asking for too much of your private information

Google’s latest machine-learning algorithm can help spot intrusive apps that demand access to user data that they don’t even need.<p>As Google points out, most Android apps are there to entertain and assist us, and we grant them access to the data that they need: for instance, a camera app needs …

Google

Cyberwarfare has taken a new turn. Yes, it’s time to worry.

The recent “ransomware” events created headaches and headlines — but also masked a greater cyber-issue: chaos and disruption on the Internet as the new normal. Earlier this week, in fact, the Alliance for Securing Democracy, a new effort headed by former U.S. national security officials, formed as …

Cybersecurity

A third of security professionals are unprepared for dealing with cyber threats

One in three security professionals lack effective intelligence to detect and action cyber threats, according to a new survey from threat …

Cybersecurity

Apple Opens Data Center in China to Comply With Cybersecurity Law

SHANGHAI — Apple has set up its first data center in China, setting the tone for how foreign companies will handle a strict new law requiring them to store Chinese users’ information in the country.<p>The center in the southern province of Guizhou, part of a $1 billion investment there, will be …

China

10 privacy gadgets to help you keep a secret

Fend off nosy neighbors, curious co-workers, and anyone else who tries to pry into your stuff.<p>Privacy is important. Just this week, another data breach occurred affecting airlines and banks in the Europe. While things such as malware are a problem and you should know how to remove it, you should …

Hacking

Responding to the cyber security incident in Parliament | Parliamentary Digital Service

Tucked into the Digital Strategy for Parliament we wrote an aspiration: secure technology that works. These four words have translated into a three …

Cybersecurity

Here's why breaking WhatsApp and iMessage encryption is such a dangerous idea

For most people, breaking WhatsApp's and iMessage's security to let the government stop terrorists sounds like a reasonable idea.<p>In the past we had wiretaps, after all, so what's wrong in updating them to the modern digital era? That's the reasoning behind some of the surveillance measures included …

Encryption

Inside the darknet: where Australians buy and sell illegal goods

A vendor was offering Medicare details of any Australian. Could this be real, or was it just a scam? The only way to know was to request some data • The Medicare machine: patient details of ‘any Australian’ for sale on darknet<p>“Our goal is to become known as the most consistent, reliable supplier of …

Security

Patient details being sold on the darknet points to a 'troubling trend in the future'

In a matter of clicks on the darknet, you can purchase the details Australians use for identification and to access health services in the country.<p>As reported by <i>The Guardian</i>, a vendor on a large darknet marketplace is illegally selling patient details in a listing dubbed the "Medicare machine."<p>The …

Security

You need to encrypt all your data. This is how it’s done

This post is part of our contributor series. The views expressed are the author's own and not necessarily shared by TNW.

Hackers launch fresh cyber assault on MPs' passwords

Hackers are calling MPs and trying to trick them into revealing their personal parliamentary details, The Telegraph can disclose.<p>Politicians and aides have been warned that hackers are posing as parliamentary officials asking for their passwords.<p>The warning comes just a week after Parliament …

Security

The Biggest Cybersecurity Disasters of 2017 So Far

The first six months of 2017 have seen an inordinate number of cybersecurity meltdowns. And they weren't just your standard corporate breaches. It's …

Security

A new tool will check if you're vulnerable to the hack that brought down computers across the globe

WannaCry paralyzed hospitals. NotPeya crashed banks. But how to know if <i>you're</i> vulnerable to the stolen National Security Agency exploit that fueled two major cyber attacks and helped bring down computers across the globe?<p>Thankfully, a new tool has your back.<p>After the Shadow Brokers hacking group …

Information Security

Cyberghost CEO: Assume everything online is public until further notice

Ransomware is terrifying for businesses, entire companies could fall without access to important corporate files. It’s no picnic for individuals either; dependence on smart devices and cloud storage make a lot of us easy targets for cyber-criminals.<p>The amount of risk people take, using their …

Privacy

Wikileaks: The CIA can remotely hack into computers that aren’t even connected to the internet

When firewalls, network-monitoring services, and antivirus software aren’t enough, there’s always been one surefire way to protect computers that control sensitive operations like power grids and water pumps: cut them off from the internet entirely. But new documents published by WikiLeaks on June …

Security

A Cyberattack ‘the World Isn’t Ready For’

NEWARK — There have been times over the last two months when Golan Ben-Oni has felt like a voice in the wilderness.<p>On April 29, someone hit his employer, IDT Corporation, with two cyberweapons that had been stolen from the National Security Agency. Mr. Ben-Oni, the global chief information officer …

The neverending cybersecurity arms race

This post is part of our contributor series. The views expressed are the author's own and not necessarily shared by TNW.

Cybersecurity

Girl Scouts will become white hat hackers with cool new cybersecurity badges

Girl Scouts will soon be ready to take over your IT department.<p>The organization is teaming up with Palo Alto Networks, an internet security company, to introduce a set of new badges to promote computer and internet literacy and cybersecurity. The initiative aims to foster educational programs …

Cybersecurity

The “Internet of Things” is way more vulnerable than you think—and not just to hackers

Not far from San Francisco International Airport, San Bruno is a quaint middle-class residential suburb, yet underground in San Bruno was a gas pipeline controlled by SCADA software that used the Internet as its communications backbone. On Sept. 9, 2010, a short circuit caused the operations room …

Internet of Things