Cyber Security Journal

By Christopher Saleh | With advances in technology, Cyber Security threats from individual Identity theft, corporate cybercrime, and Cyber wars are advancing just as fast, and in some cases faster. So, awareness is the key. Gathering critical news and latest trend updates is essential to remain vigilant.

Report: Amazon in talks to acquire cybersecurity startup Sqrrl

Amazon.com Inc. is claimed to be in advanced talks to acquire Sqrrl Data Inc., a Massachusetts-based cybersecurity software company that specializes …

Amazon.com Inc

Windows 10 included a password manager complete with massive password-stealing potential

Microsoft has been bundling a password manager that features a dangerous flaw with some versions of Windows 10, a Google security researcher has …

Information Security

North Korean hackers are targeting cryptocurrency workers

As cryptocurrency prices continue to increase, digital funds are attracting the attention of both investors and cybercriminals alike. According to …

Security

The worst passwords of 2017

Poor passwords place internet users at risk. (Duncan Alfreds, Fin24)<p>Cape Town - The excitement generated by the new Star Wars movie has convinced …

Security

Sophisticated ‘Triton’ malware shuts down industrial plant in hacker attack

Cybersecurity experts at FireEye have issued a warning after a recent hacker attack caused “operational disruption to critical infrastructure” at an …

Cybersecurity

7 cyber security predictions for 2018

Given what’s happened in 2017 — the Equifax breach, state-sponsored attacks, Russian manipulation of social media, Wannacry, and more phishing scams …

Cybersecurity

Security finally got the awareness it needed in 2017. Now what?

Chatter about getting hacked isn’t just for gadget and security enthusiasts anymore. Cybersecurity has gone mainstream.<p>The first week of October's Cybersecurity Awareness Month kicked off with a bang.<p>But it wasn't because the campaign itself succeeded at generating awareness about digital threats. …

Cybersecurity

F.C.C. Repeals Net Neutrality Rules

WASHINGTON — The Federal Communications Commission voted on Thursday to dismantle landmark rules regulating the businesses that connect consumers to the internet, granting broadband companies the power to potentially reshape Americans’ online experiences.<p>The agency scrapped the so-called net …

Internet

A Russian Hacker Confessed to Hacking the DNC During the Election Campaign

A Russian hacker has confessed, in court, to being hired by Russian state intelligence to hack the Democratic National Congress’ computer systems in …

Russia

German intelligence unmasks alleged covert Chinese social media profiles

BERLIN (Reuters) - Germany's intelligence service has published the details of social network profiles which it says are fronts faked by Chinese intelligence to gather personal information about German officials and politicians.<p>The BfV domestic intelligence service took the unusual step of naming …

China

This Is How to Safely Surf the Internet

With data breaches like the Equifax hack becoming more common, investing in your online privacy has never been more critical. And let’s be real: that …

Country Lifestyle

What is the Dark Web ?

The world wide web is more vast than you think, but the majority of us see only the surface of it.<p>In fact, when someone says that Google or other …

Security

Intel ME bug storm: Is your machine among 100s just named by Acer, Dell, HP, Lenovo?

Hardware vendors race to identify and provide updates for dangerous Intel flaws.<p>Big-brand PC and server manufacturers have listed models affected by …

Information Security

Google collects Android users’ locations even when location services are disabled

Many people realize that smartphones track their locations. But what if you actively turn off location services, haven’t used any apps, and haven’t even inserted a carrier SIM card?<p>Even if you take all of those precautions, phones running Android software gather data about your location and send it …

John Gruber

Government Outlines When It Will Disclose Or Exploit Software Vulnerabilities

Government agencies that deal with cybersecurity, like the National Security Agency, have two competing interests. On the one hand, they want to protect America's online infrastructure and economy from cyberattacks. On the other hand, government agencies want to harness tools to attack opponents in …

Electronic Frontier Foundation

The new, clever way hackers can get into your bank account

According to a blog post by Cisco-owned Talos, the Zeus Panda malware essentially “poisons” Google search results to push fake bank-related results …

Microsoft Word

Security News This Week: $280M Worth of Ethereum Is Trapped for a Pretty Dumb Reason

On Monday, a small configuration mistake at an internet service provider and infrastructure company caused internet outages around the United States …

Most People Aren't Using This Critical Web Security Feature

The ongoing hacking epidemic is leading people to protect their online accounts—or so you would think. In reality, a study suggests about three …

Russian hacking went far beyond US election, digital hitlist reveals

Hackers targeted Ukrainian officers, US defense contractors and many others News comes as US weighs charges against Russian government officials<p>The hackers who upended the US presidential election had ambitions well beyond Hillary Clinton’s campaign, targeting the emails of Ukrainian officers, …

Security

What Blue Teams Need to Know about Targeted Attacks

A malicious intruder only has to be right once. But defenders must be right 100% of the time.<p>Unlike in a courtroom, the defense never rests when it …

DNC Hackers Had a 'Hit List' Chock-Full of Putin Foes

Concluding an exhaustive review of evidence, the Associated Press presented a powerful case Thursday morning that further ties the perpetrators of …

Security

Explainer: What is Russia's new VPN law all about?

http://vod-pro-ww-live.akamaized.net/mps_h264_hi/public/news/technology/1220000/1220945_h264_1500k.mp4?__gda__=1512681161_4934fecc4316bad8513c2f186c4fc144<p><b>A Russian law regulating the use of technologies enabling users to search the internet anonymously came into force on 1 November.</b><p>Many are worried …

Censorship

Oracle pushes out emergency fix for remote system hijack vulnerability

The vulnerability, as bad as it gets, allows attackers to remotely take over enterprise software without authentication.<p>Oracle has broken its usual …

Information Security

Subdomain takeover and prevention using Knockpy

<b>Subdomain takeover and phishing attack</b><p><b>What is a subdomain?</b><p>A subdomain is basically your second website with its own unique name. There is no new …

Information Security

Hackers are effectively using combosquatting to trick users into visiting malicious websites: Study

Hackers are using a technique known as combosquatting to trick users into visiting malicious websites. The attackers buy a domain name that sounds …

Information Security

UTSA partners with Rackspace on new center to research cybersecurity

The University of Texas at San Antonio has studied cybersecurity and cloud computing technology for years, but a new grant-funded center is meant to …

Cybersecurity

5 Things You Need to Know About the New (and Scary) Wave of 'File-less' Cyber Attacks

Companies are bracing for cyber attacks that use those companies' own system tools against them -- and keep their IT professionals up at night.<p>In the wake of the Equifax breach and the global WannaCry ransomware outbreak earlier this year, tensions around cybersecurity are at an all-time high. …

Cybersecurity

Researchers warn of new botnet that could take down the internet

Security group Check Point Research claims to have discovered a rapidly growing and evolving botnet which they believe could eventually take down the …

It Takes Just $1,000 to Track Someone's Location With Mobile Ads

When you consider the nagging privacy risks of online advertising, you may find comfort in the thought of a vast, abstract company like Pepsi or Nike …