Tuesday, December 11, 2018

How Deception Technology Gives You The Upper Hand In Cybersecurity

Deception offers an effective way to detect attacks in progress, with no false positives. It alters the balance of power between attacker and target, giving companies the upper hand in combating both external and internal threats.

California Revives Stronger Net Neutrality Bill After Public Backlash

After outcry over a hollowed-out version, California lawmakers are moving forward with a restored bill to protect state consumers without federal rules.

Facial Recognition And Future Scenarios

Will facial recognition technologies mean we will be permanently under surveillance in the future? Should schools and colleges be teaching children how this technology works? Or should we just ignore this technology as if it wasn’t happening? Are there...

‘Disturbing’ Smartphone Hacks Hit Saudi Activists Via WhatsApp

As many as 175 cases of individuals targeted with dangerous Israeli-made malware, according to one figure. In the latest case, a WhatsApp message laced with the Pegasus spyware was sent to an Amnesty International researcher.

Why I Switched To The Samsung Galaxy S9+ As My Primary Phone

Analyst Patrick Moorhead is making the switch to the Samsung Galaxy S9+. Here are his thoughts.

IBM’s HR Chief Shares Best Advice On The Future Of Work

IBM Chief of Human Resources Diane Gherson shares her best career advice and the future of work.

The Evolving Enterprise Calculus Of Public Cloud Versus Private Infrastructure

There is clear enterprise consensus that hybrid cloud is the appropriate long-term strategic approach to best leverage cloud computing. There has been much less consensus in decision-making on the underlying use of public cloud versus private infrastructure for individual...

200,000 Routers Turned Into Mindless Crypto Coin Mining Zombies

A malware infection is targeting people's routers and it's forcing them to mine for cryptocurrency.

Artificial Intelligence, Gates, Rockefeller, Sloan, Carnegie & Ford Can Defeat Bad Social Media

Fake news, conspiracies, and outright lies (FCL) intended to undermine US institutions and the US culture are exploding in social media. Artificial intelligence (AI) can help identify FCL when they occur and counter-attack in real-time with evidence. ...

Supply Chain Attacks Increase As Cybercriminals Focus On Exploiting Weak Links

A new report from CrowdStrike highlights the growing risk of supply chain attacks and how unprepared most organizations are to detect or respond to them.

These Are The Five Most Dangerous Email Attachments

Your email inbox can be a dangerous place to navigate, particularly if you don't know how to spot a suspicious message.

Facebook Violates Trust of ‘Private’ Patient Groups

Thousands of women who carry mutations in the genes BRCA1 and BRCA2 and joined ‘private’ Facebook groups recently learned that their groups were vulnerable to a Chrome plug-in that allowed marketers to discover group members’ names and other private...

Cryptojacking Displaces Ransomware As Most Popular Cyberthreat

Cryptojacking can no longer operate under the covers. Every CISO must understand the significance of this threat, and rank cryptojacking among the top cyberthreats facing the enterprise. Complacency is no excuse.

IBM’s 2018 Data Breach Study Shows Why We’re In A Zero Trust World Now

U.S. based breaches are the most expensive globally, costing on average $7.91M with the highest global notification cost as well, $740,000. A typical data breach costs a company $3.86M, up 6.4% from $3.62M last year.

Chinese Hackers Are Attacking Government Agencies Via Snail Mail

Why bother with sophisticated hacks over the Internet if you can trick someone into infecting themselves the old fashioned way?

And that was actually the CLEAN version!

It's more than a few years back, and this oilfield services company is implementing a new email filter, says a pilot fish working there."It was part of an email security product," fish says. "The filter could identify emails containing...

Review: How StackRox protects containers

With the rise of cloud computing and later DevOps, containerization has never been more popular. But cybersecurity has yet to fully catch up. Even security applications designed to work natively in the cloud have trouble protecting the most popular...

Dark web goldmine busted by Europol

What’s the safest way to buy counterfeit banknotes? Not on the dark web market, as 235 people have just discovered to their cost.
Security Affairs

Google will shut down consumer version of Google+ earlier due to a bug

Google announced it will close the consumer version of Google+ before than originally planned due to the discovery of a new security flaw. Google will close the consumer version of Google+ in April, four months earlier than planned. According to G...

Teen SWATter who had 400 schools evacuated lands 3 years in jail

George Duke-Cohan is the British teen who posed as a worried father whose daughter had called him mid-flight during a hijacking.