China, Leverage, and Values

If there is a new tech cold war, it is one with shots fired over a decade ago, largely by China. The questions going forward are about both leverage and values.

Source: China, Leverage, and Values

5G is a war the US is about to lose warns DoD

more on Cyber War

 

Image result for Digital Cold War

Jack Goldsmith: “The United States is Losing the Digital Cold War” | Talks at Google


Leave a Comment

Microsoft wants a US privacy law that puts the burden on tech companies

On the first anniversary of #GDPR, Microsoft calls for a similar privacy law in the US that puts the burden on the companies that collect and use sensitive data.

Europe’s privacy law went into effect nearly a year ago. It’s time for the US to catch up, the tech giant says.

Source: Microsoft wants a US privacy law that puts the burden on tech companies

 

 

 Subscribe in a reader

Leave a Comment

Millions of Instagram influencers had their private contact data scraped and exposed

Millions of Instagram influencers had their private contact data scraped and exposed

A massive database containing contact information of millions of Instagram influencers, celebrities and brand accounts has been found online. The database, hosted by Amazon Web Services, was left exposed and without a password allowing anyone to look inside. At the time of writing, the database had over 49 million records — but was growing by […]

Source: Millions of Instagram influencers had their private contact data scraped and exposed – TechCrunch


 Subscribe in a reader

Leave a Comment

AWS Security Profiles: Tracy Pierce, Senior Consultant, Security Specialty, Remote Consulting Services | Amazon Web Services

In the weeks leading up to re:Inforce, we’ll share conversations we’ve had with people at AWS who will be presenting at the event so you can learn more about them and some of the interesting work that they’re doing. You’ve worn a lot of hats at AWS. What do you do in your current role, […]

Source: AWS Security Profiles: Tracy Pierce, Senior Consultant, Security Specialty, Remote Consulting Services | Amazon Web Services


 Subscribe in a reader

Leave a Comment

Microsoft renewed its Attack Surface Analyzer, version 2.0 is online

Microsoft has renewed its Attack Surface Analyzer tool (version 2.0) to take advantage of modern, cross-platform technologies.

Source: Microsoft renewed its Attack Surface Analyzer, version 2.0 is online


 Subscribe in a reader

Leave a Comment

Virus Removal Tool

Virus Removal Tool

Free Virus Removal Tools to Secure Against Virus Infection, Including Conficker, Rootkits and More. Download the Free Sophos Virus Removal Tool Today.

Source: Sophos Virus Removal Tool


 Subscribe in a reader

Leave a Comment

California is bringing law and order to big data. It could change the internet in the U.S.

   ⚖️ California is bringing law and order to big data ⚖️

California Expands Consumer Privacy Protections | The California Consumer Privacy Act, or CCPA, gives residents of California the ability to request the data that businesses collect on them, demand that it be deleted, and opt out of having that data sold to third parties, among other things.

The state’s attorney general wants to avoid a troubled rollout, à la Obamacare, when the far-reaching restrictions on user data go into effect on Jan. 1.

Source: California is bringing law and order to big data. It could change the internet in the U.S.

here’s the no paywall copy of the article… https://archive.fo/NmU9E


 Subscribe in a reader

Leave a Comment

Most popular programming languages on stack overflow

Most popular programming languages


 Subscribe in a reader

Leave a Comment

Hacking the ‘Unhackable’ eyeDisk USB stick with Wireshark

The paradox, the USB stick eyeDisk that uses iris recognition to unlock the drive could reveal the device’s password in plain text in a simple way.

Source: Hacking the ‘Unhackable’ eyeDisk USB stick with Wireshark


 Subscribe in a reader

Leave a Comment

7 Types of Experiences Every Security Pro Should Have

As the saying goes, experience is the best teacher. It’ll also make you a better and more well-rounded security pro.

Source: 7 Types of Experiences Every Security Pro Should Have

 Subscribe in a reader

Leave a Comment

Hackers exploit Jenkins flaw CVE-2018-1000861 to Kerberods malware

Hackers exploit Jenkins flaw CVE-2018-1000861 to Kerberods malware

Threat actors are exploiting a Jenkins vulnerability (CVE-2018-1000861) disclosed in 2018 to deliver a cryptocurrency miner using the Kerberods dropper

Follow the numbers in blue to understand each step.

Threat actors are exploiting a Jenkins vulnerability (CVE-2018-1000861) disclosed in 2018 to deliver a cryptocurrency miner using the Kerberods dropper

Source: Hackers exploit Jenkins flaw CVE-2018-1000861 to Kerberods malware




 


 Subscribe in a reader

Comments (1)

ICS-CERT warns of several flaws in the GE Communicator software

ICS-CERT is warning of several vulnerabilities in the GE Communicator software, including hardcoded credentials and privilege escalation bugs.

Source: ICS-CERT warns of several flaws in the GE Communicator software




 Subscribe in a reader

Leave a Comment

Unsecured SkyMed Database Exposed PII Data Of 137K Individuals

Unsecured SkyMed Database Exposed PII Data Of 137K Individuals

Reportedly, the unsecured SkyMed database exposed huge records having medical and personal information of US citizens online.

Source: Unsecured SkyMed Database Exposed PII Data Of 137K Individuals



ISO/IEC 27018:2014, 1st Edition: Information technology – Security techniques – Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors



NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)

 Subscribe in a reader

Leave a Comment

Belgian programmer solves cryptographic puzzle

Belgian programmer solves cryptographic puzzle – 15 years too soon!

Belgian coder Bernard Fabrot just finished a 3.5-year computational marathon, solving a fascinating cryptopuzzle set at MIT back in 1999.

Source: Belgian programmer solves cryptographic puzzle – 15 years too soon!

 

 Subscribe in a reader

Leave a Comment

Cyber Readiness Report 2019

Cyber Readiness Report 2019 – By Hiscox


Leave a Comment

Creating A Cyber Secure Home

Creating A Cyber Secure Home – Infographic via SANS Institute

 Subscribe in a reader

Leave a Comment

Lagging behind: why government organisations need to upgrade their email security -TEISS® : Cracking Cyber Security

Organisations need to upgrade their email security

Maor Hizkiev, CTO and co-founder, BitDam, explains how and why government organisations are lagging behind in implementing standard email security measures and what needs to be done to improve the state of security in the public sector.

Source: Lagging behind: why government organisations need to upgrade their email security -TEISS® : Cracking Cyber Security


Email Security with Cisco IronPort

Email Security Awareness




 Subscribe in a reader

Leave a Comment

Facebook funds research on the impact of social media on elections

Impact of social media on elections

Facebook is going to fund academic research on the impact of social media on elections, aimed at preventing manipulation of these platforms.

Source: Facebook funds research on the impact of social media on elections


 Subscribe in a reader

Leave a Comment

Tech Support Scammers Freeze Browsers Using Iframes

Tech Support Scammers Freeze Browsers Using Iframes

Tech support scammers are using iframes to lock web browsers and to trick people into calling their support hotlines posing as legitimate services to have their computers fixed after being presented with a “computer has been blocked” alert.

Source: Tech Support Scammers Freeze Browsers Using Iframes

 

The Browser Hacker’s Handbook



 Subscribe in a reader

Leave a Comment

Computer security training courses

Computer security training courses – Online cyber security courses

Build your cyber security awareness and InfoSec career to keep your cyber security skills relevant. Learn how to protect your information assets against today’s cyber threats with best online cyber security training courses.

 

DISC InfoSec cyber security training curriculum includes specialized InfoSec training and general cyber security courses for all levels.

 

Security Penetration Testing (The Art of Hacking Series) LiveLessons

Security Penetration Testing (The Art of Hacking Series) LiveLessons

Linux Security and Hardening, The Practical Security Guide

Linux Security and Hardening, The Practical Security Guide

CISSP LiveLessons

CISSP LiveLessons

Red Hat Certified Engineer (RHCE) with Virtual Machines LiveLessons

Red Hat Certified Engineer (RHCE) with Virtual Machines LiveLessons, 2nd Edition

Fundamentals of nerc cip

Fundamentals of nerc cip

Cyber Security – Online Scams & How to Avoid Them

Cyber Security - Online Scams & How to Avoid Them

Disaster Recovery and Risk Management

Disaster Recovery and Risk Management

 

 

Penetration Testing

Kali Linux

ISO27001

Python

CISSP

GDPR

Linux

Identity Theft

Powershell Security

Programming Courses

Security Risk Management

Planning a Security Incident Respose

AWS Security

Azure Security

Network Security

Wireless Security

RedHat Security

InfoSec eLearning

Social Engineering

Essentials of CyberSecurity

Azure Security & Compliance

Cyber Security Training Courses

Security Disaster Recovery

Cloud Security Computing 

 

 


 Subscribe in a reader

Leave a Comment