Rick

174 Added | 9 Magazines | 4 Likes | 2 Followers | @rickh0208 | Keep up with Rick on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Rick”

How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack

While Wi-Fi networks can be set up by smart IT people, that doesn't mean the users of the network are similarly tech-savvy. We'll demonstrate how an …

White Hat

Marymount University evacuated after bomb threat; student in custody

The campus at Marymount University in Arlington, Virginia, has been evacuated as authorities investigate a bomb threat made on social media. One …

Terrorism

Why People Should Learn About Cybersecurity In 2018

You might think of cybersecurity as a specialized, niche career–not a skill that the average person should learn about.<p>But that’s not the case. In an age where we manage more and more of our lives digitally, it means that anyone–in any career–should know simple things about keeping security up to …

Cybersecurity

Facebook scraped call, text message data for years from Android phones [Updated] | Ars Technica

Maybe check your data archive to see if Facebook’s algorithms know who you called.<p><b>[Update, March 25, 2018, 20:24 Eastern Time]: Facebook has</b> …

Google Play

No data lost during attack on computer network, Buffalo school district says

Buffalo Public Schools said there was no data breach or information lost during an attack on its computer network.<p>District officials said it …

Education

Senior NSA official says tech is wondrous -- and risky in a world of cyberspace foes

The United States' top four nation-state cyber adversaries are Russia, China, Iran and North Korea, and nothing is off limits, including the nuclear arsenal, a senior NSA official told Fox News in an exclusive interview.<p>"Technology brings great opportunity but also brings great risk," the National …

National Security

New Facebook email scam on the rise

If you are aware of what’s happening in the world of technology, then you must be knowing that everyone’s granddaddy social media platform Facebook …

Social Media

The Case for Integrating Physical Security Cybersecurity

Aggregating threat intel from external data sources is no longer enough. You must look inside and outside your traditional knowledge base for the …

Cybersecurity

Hacking it: a peek into the life of a cybersecurity professional

The 2017 news cycle was inundated with headlines about high-profile, large-scale data breaches. In their wake, millions of Americans were left wondering if their sensitive information—social security numbers and credit card details—had been compromised.<p>The apparent uptick in breaches is …

Cybersecurity

GozNym malware has stolen $4 million from users’ bank accounts

When the average person finds their computer is infected with malware, it can range from a minor annoyance, to something they need a little extra …

Ransomware

'Evil' Hack Uses Wi-Fi to Destroy Your iPhone—Maybe

If you haven’t updated to Apple’s iOS 9.3 yet, now’s the time.<p>Security experts have found a way for a malicious hacker to dupe unwitting iPhone or …

Home Security

Homeland Security urges you to uninstall QuickTime on Windows

The Department of Homeland Security is echoing Trend Micro's advice to uninstall QuickTime if you have it on your Windows computer. While the multimedia program's working just fine, the security firm has discovered two new critical vulnerabilities lurking within it that could allow remote attackers …

Cyber fraudsters reap $2.3 billion through email wire-transfer scams

<i>BOSTON (Reuters)</i> — Businesses have lost billions of dollars to fast-growing scams where fraudsters impersonate company executives in emails that order staff to transfer to accounts controlled by criminals, according to the U.S. Federal Bureau of Investigation.<p>Losses from these scams, which are …

Identity Theft

A new exploit gives hackers near-total control of any Mac

A newly discovered zero-day vulnerability for OS X allows hackers to execute code previously thought to be protected by Apples new kernel defense, known as System Identity Protection (SIP).<p>“Our researchers recently uncovered a major flaw which allows for local privilege escalation and bypass of …

Information Security

Using a hotel's free wifi hotspot? It could end up costing you a fortune

A disgruntled hotel guest made his feelings clear on social media when his internet connection kept dropping. "Dear hotels all around the world," …

Wi-Fi

DROWN attack breaks HTTPS on 33% of websites

It feels like we just got over Heartbleed and there’s another branded exploit out there.<p>DROWN, a new vulnerability in OpenSSL that affects servers using SSLv2, was revealed today as an attack that could decrypt your secure HTTPS communications, such as passwords or credit card numbers. More than 33 …

Information Security

One of the oldest rules about passwords is totally wrong

Your school or workplace may require you to change your password every couple of months or so to keep your account safe. It’s a widely implemented security recommendation.<p>Except it’s totally wrong.<p>The Federal Trade Commission’s chief technologist, Lorrie Cranor, busted that myth earlier this week …

Does dropping malicious USB sticks really work? Yes, worryingly well...

Plugging in that USB stick you found lying around on the street outside your office could lead to a security breach.<p>This is no secret, of course. We …

Information Security

4 major email cyber security threats and how to tackle them

List: Phishing scams and spam – what email threats should you be looking out for?<p>Email is one of the most common routes in which a hacker can gain …

Cybersecurity

Fake QR code app gets hacker into luxury airport lounges for free

Free airline Fast Track for all! Free lunch and booze at luxury airport lounges for all! Duty-free shopping for all!<p>That’s what a fake QR code …

Bruce Schneier

Delta Datacenter Crash: Do the Math on Disaster Recovery ROI

August 9, 2016 Nicole Hemsoth<p>How on earth could a company the size and scope of Delta—a company whose very business relies on its ability to process, …

Disaster Recovery
Cybersecurity

University gives in to $20,000 ransomware demand

The University of Calgary has stumped up $20,000 CAD to wrestle back access to files locked away by malware.<p>The University of Calgary has admitted to …

Ransomware

Black Friday 2016: 15 ways to avoid being hacked online

With Black Friday on the horizon, millions of shoppers are likely to check in to online shopping accounts in order to grab a bargain.<p>Many of these accounts contain sensitive details such as credit card numbers, addresses and phone numbers, and are often signed up to quickly in order to snag a …

Black Friday

Five simple ways to protect yourself from identity theft

Identity theft can cost time, effort, and money to correct, but a few simple fixes can protect your personal information from prying eyes and …

Identity Theft

Windows security flaw lets hackers run any app on PCs

If you think your network of Windows computers is safe from malware because you’ve set up Applocker to whitelist only trusted apps, we have some bad news.<p>A newly discovered security flaw allows users to get around this on business editions of Windows (Windows 7 and up) by using Regsvr32. You can …

This Is Exactly What Not To Do When You Find a USB Stick

Listen, I get it. When you find a random USB stick laying around somewhere, it’s tempting to snatch it up and plug it in to your computer. Maybe it’s …

University of Illinois

Why No One Wants to Be a Chief Information Officer Any More

Twenty years ago, in 1996, I was directing a “techno-MBA” program at the University of Texas at Austin. Many of the students in this program aspired …

Big Data