Cyber security - Hacking

By paulvalach | paulvalach created a magazine on Flipboard. “Cyber security - Hacking on Flipboard” is available with thousands of other magazines and all the news you care about. Download Flipboard for free and search for “paulvalach”.

How Businesses Are Applying AI to Cybersecurity

In a digital threat landscape where businesses are constantly playing catch-up with new attack vectors and vulnerabilities, the best defense they have is the same thing that makes them such an appealing target for hackers: a mountain of data. Sure, you've got endpoint protection and encryption …

Cybersecurity

The world needs more ethical hackers. Are you up for the job?

Just to let you know, if you buy something featured here, Mashable might earn an affiliate commission.<p>Hackers used to be a small subculture of punk …

Cybersecurity

How to make your passwords worthless to cyber thieves

When IBM introduced the first laptop with a built-in fingerprint sensor in 2004, it sparked a wave of product development in biometrics. At the time, a colleague delighted in fooling sensor after sensor with a rubber replica of his own finger.<p>The best way to make your accounts more secure is to …

Cybersecurity

SEC discloses cybersecurity breach

The Securities and Exchange Commission on Wednesday said its “EDGAR” public-company filing system had been hacked.<p>SEC Chairman Jay Clayton said in a statement that last month "the Commission learned that an incident previously detected in 2016 may have provided the basis for illicit gain through …

Cybersecurity

This CEO started at the CIA — now he's playing cybersecurity detective for Fortune 500 companies

Qadium CEO Tim Junio started his career at the CIA. Qadium<p><b>Qadium is a cybersecurity startup that scans the open internet, keeping careful watch for any corporate devices that could be exposed to a potential attack.</b><p><b>It's just closed a $40 million funding round that was led by IVP.</b><p><b>CEO Tim Junio</b> …

Startups

Here's What Hackers Don't Want You to Know

Cybercrime is getting worse. Keep your company safe by following the latest recommendations in network security.<p>Surely at this point in time we all know that cybercrime is a serious issue that affects everyone. We've heard all about password hygiene, hacking that comes from third-party vendors, and …

9 Factors To Ensure Your Cybersecurity Policy Works For Your Staff, Not Against Them

Companies and organizations are still struggling to deal with ransomware, a cyberattack in which user data is encrypted and held hostage, supposedly until a ransom is paid. This trend looks set to continue and perhaps even intensify. I often get asked by executive management about what they should …

Cybersecurity

Even the best passwords are no match for this simple hack

Why go to all the trouble of breaking into an online account when you can just ask for the keys?<p>While security experts released new password …

Security

The unknown hackers

Open-source pioneers Bill and Lynne Jolitz may be the most famous programmers you've never heard of.<p><b>N</b>ot many Linux-come-latelies know this, but Linux was actually the <i>second</i> open-source Unix-based operating system for personal computers to be distributed over the Internet. The first was 386BSD, …

Linus Torvalds

A cybersecurity expert on why you should be very worried about the internet’s future

"It will take the attention of the free society that built the internet to save it." —Alexander Klimburg<p>In 2012, the New York Times’s David Sanger broke a bombshell story detailing a joint US-Israel cyber attack on Iran that undermined its nuclear enrichment facilities. The computer virus, dubbed …

Reputation is Cyber Security is Digital Marketing

The connection between one's reputation, whether an individual or company/organization; and cyber security is real and persistent. The more that one connects to devices, and connects those devices to the internet and social networks the more this becomes true. This is exponentially true for …

The ultimate plain English guide to cybersecurity buzzwords

Words like worm, trojan horse and zombie may seem like the stuff of science fiction, but they’re part of the reality of life online.<p>Now that we communicate, work and entertain ourselves on the internet, these familiar terms start to take on new meaning. They’re just a few of the cybersecurity …

Cybersecurity

NSA Chief Mike Rogers Is Not Here for Trump and Putin's 'Impenetrable Cyber Security Unit'

President Donald Trump, whose recent uses of the internet have included hinting he might just pardon himself and everyone else in his administration …

China WhatsApp crackdown only scratches surface of worsening internet censorship

<b>Hong Kong (CNN) —</b> As Liu Xiaobo, the Chinese Nobel Peace Prize laureate, lay dying in a heavily-guarded hospital last month, there was little mention of his fate in China.<p>For many younger Chinese, Liu is an unknown figure, the culmination of years of intense censorship of his life and works. The …

China

How To Steal A Phone Number (And Everything Linked To It)

Someone impersonating you to an AT&T or Verizon employee isn’t the only thing you need to worry about. Meet Signaling System 7, a hacker’s best friend.<p>Last spring, Dena Haritos Tsamitis left a work meeting to discover she was unable to get a signal on her cellphone. Even after rebooting the device, …

Google can tell which apps are asking for too much of your private information

Google’s latest machine-learning algorithm can help spot intrusive apps that demand access to user data that they don’t even need.<p>As Google points out, most Android apps are there to entertain and assist us, and we grant them access to the data that they need: for instance, a camera app needs …

Google

Cyberwarfare has taken a new turn. Yes, it’s time to worry.

The recent “ransomware” events created headaches and headlines — but also masked a greater cyber-issue: chaos and disruption on the Internet as the new normal. Earlier this week, in fact, the Alliance for Securing Democracy, a new effort headed by former U.S. national security officials, formed as …

Cybersecurity

A third of security professionals are unprepared for dealing with cyber threats

One in three security professionals lack effective intelligence to detect and action cyber threats, according to a new survey from threat …

Apple Opening Data Center in China to Comply With Cybersecurity Law

SHANGHAI — Apple said Wednesday that it would open its first data center in China, joining a parade of technology companies responding to growing global demands to build facilities that store online data closer to customers.<p>The move is a response to a strict new law in China that requires companies …

China

10 privacy gadgets to help you keep a secret

Fend off nosy neighbors, curious co-workers, and anyone else who tries to pry into your stuff.<p>Privacy is important. Just this week, another data breach occurred affecting airlines and banks in the Europe. While things such as malware are a problem and you should know how to remove it, you should …

Shopping

Responding to the cyber security incident in Parliament | Parliamentary Digital Service

Tucked into the Digital Strategy for Parliament we wrote an aspiration: secure technology that works. These four words have translated into a three …

Here's why breaking WhatsApp and iMessage encryption is such a dangerous idea

For most people, breaking WhatsApp's and iMessage's security to let the government stop terrorists sounds like a reasonable idea.<p>In the past we had …

Encryption

Inside the darknet: where Australians buy and sell illegal goods

A vendor was offering Medicare details of any Australian. Could this be real, or was it just a scam? The only way to know was to request some data • The Medicare machine: patient details of ‘any Australian’ for sale on darknet<p>“Our goal is to become known as the most consistent, reliable supplier of …

Darknet

Patient details being sold on the darknet points to a 'troubling trend in the future'

In a matter of clicks on the darknet, you can purchase the details Australians use for identification and to access health services in the country.<p>As …

Security

You need to encrypt all your data. This is how it’s done

Email has become a de facto medium for exchanges of all sorts. We use email to send business secrets, financial data, personal data and various kinds of sensitive information. There are few things that are as damaging as a hacked email account.<p>You should obviously do everything you can to protect …

Encryption

Hackers launch fresh cyber assault on MPs' passwords

Hackers are calling MPs and trying to trick them into revealing their personal parliamentary details, The Telegraph can disclose.<p>Politicians and aides have been warned that hackers are posing as parliamentary officials asking for their passwords.<p>The warning comes just a week after Parliament …

Security

The Biggest Cybersecurity Disasters of 2017 So Far

The first six months of 2017 have seen an inordinate number of cybersecurity meltdowns. And they weren't just your standard corporate breaches. It's …

A new tool will check if you're vulnerable to the hack that brought down computers across the globe

WannaCry paralyzed hospitals. NotPeya crashed banks. But how to know if <i>you're</i> vulnerable to the stolen National Security Agency exploit that fueled …

Information Security

Cyberghost CEO: Assume everything online is public until further notice

Ransomware is terrifying for businesses, entire companies could fall without access to important corporate files. It’s no picnic for individuals either; dependence on smart devices and cloud storage make a lot of us easy targets for cyber-criminals.<p>The amount of risk people take, using their …

Security