Archive for the ‘Information Security’ Category

Recovering a hacked account

A step by step guide to recovering an online account

Leave a Comment

CPRA Compliance

This tool enables you to identify your organization’s CPRA (California Privacy Rights Act) compliance gaps, and helps you plan the steps necessary to achieve ongoing compliance.

Leave a Comment

Crafting the InfoSec PlayBook

Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence and incident detection strategy, […]

Leave a Comment

President Biden’s Peloton exercise equipment under scrutiny

President Joe Biden can’t bring his Peloton exercise equipment to the White House due to security reasons. Peloton devices are connected online and are equipped with a camera and microphone that give the users an immersive experience and communications capabilities. On the other side, these features pose a potential risk to the user in case […]

Leave a Comment

10 Best InfoSec Hacking Books

10 Best InfoSec Hacking Books To download 10 Best InfoSec Hacking Books pdf   To download 10 Best InfoSec Hacking Books pdf  

Leave a Comment

Microsoft’s Pluton chip upgrades the hardware security of Windows PCs

The next Windows PC you buy could come with an advanced security co-processor that will protect your data from being stolen by hackers. The next Windows PC you buy could come with an advanced security co-processor that will protect your data from being stolen by hackers. Building on work it started with the Xbox One, […]

Leave a Comment

Pwn2Own Tokyo Day one: NETGEAR Router, WD NAS Device hacked

Pwn2Own Tokyo 2020 hacking competition is started, bug bounty hunters already hacked a NETGEAR router and a Western Digital NAS devices. The Pwn2Own Tokyo is actually coordinated by Zero Day Initiative from Toronto, Canada, and white hat hackers taking part in the competition have to demonstrate their ability to find and exploit vulnerabilities in a […]

Leave a Comment

Spotting a Common Scam

Spotting a Common Scam  These scams seek to collect personal information about you, often appearing to come from a real business or agency. Someone may pose as an official disaster aid worker, or send you a fraudulent COVID contact tracing email. If you receive a message with a link, you should not click it as it may download malware to your device to […]

Leave a Comment

Cisco engineer resigns then nukes 16k WebEx accounts, 456 VMs

A former Cisco employee pleaded guilty to accessing the company’s cloud infrastructure in 2018, five months after resigning, to deploy code that led to the shut down of more than 16,000 WebEx Teams accounts and the deletion of 456 virtual machines. According to a plea agreement filed on July 30, 2020, 30-year-old Sudhish Kasaba Ramesh accessed […]

Leave a Comment

edX Courses | View all online computer science courses on edX

Find online courses from top universities. Search all edX MOOCs from Harvard, MIT and more and enroll in a free course today. Source: edX Courses | View all online courses on edX.org   Download a Security Risk Assessment Steps paper! Security Risk assessment Quiz – Find Out How Your security risk assessment Stands Up! DISC […]

Leave a Comment

Rite Aid deployed facial recognition system in hundreds of U.S. stores

Rite Aid used facial recognition in largely lower-income, non-white neighborhoods. The systems included one from a firm with links to China and its government Source: Rite Aid deployed facial recognition system in hundreds of U.S. stores Rite Aid facial recognition rollout faces trouble Cyber Espionage Download a Security Risk Assessment Steps paper! Subscribe to DISC […]

Leave a Comment

Twitter stepped up search to fill top security job ahead of hack

Search for a chief information security officer Twitter Inc had stepped up its search for a chief information security officer in recent weeks, two people familiar with the effort told Reuters, before the breach of high-profile accounts on Wednesday raised alarms about the platform’s security. Twitter said hackers had targeted employees with access to its […]

Leave a Comment

Ten Steps to Reduce Your Cyber Risk

Reduce your cyber risk with ISO 27001 Contact DISC InfoSec if you have a question regarding ISO 27001 implementation. Explore the subject of Cyber Attack Download a Security Risk Assessment Steps paper! Subscribe to DISC InfoSec blog by Email Take an awareness quiz to test your basic cybersecurity knowledge DISC InfoSec 🔒 securing the business […]

Leave a Comment

How to uninstall Microsoft Edge forced-installed via Windows Update

If Microsoft Edge was installed in Windows 10 via Windows Update, you can not remove it via standard methods. That does not mean you cannot remove it, though, as a technique has been discovered to uninstall the program via the command prompt. Source: How to uninstall Microsoft Edge forced-installed via Windows Update New Microsoft Edge […]

Leave a Comment

AWS said it mitigated a 2.3 Tbps DDoS attack, the largest ever | ZDNet

The previous record for the largest DDoS attack ever recorded was of 1.7 Tbps, recorded in March 2018. Source: AWS said it mitigated a 2.3 Tbps DDoS attack, the largest ever | ZDNet Was the US hit by a massive ‘DDoS attack’? What is DDOS? Is America Under a Foreign Cyber Attack?! Would like to […]

Leave a Comment

Tech firms suspend use of ‘biased’ facial recognition technology

Amazon, IBM and now Microsoft ban the sale of facial recognition technology to police departments and are urging for federal laws to regulate its use. Source: Tech firms suspend use of ‘biased’ facial recognition technology Download a Security Risk Assessment steps paper! Download a vCISO template Subscribe to DISC InfoSec blog by Email Why Cities […]

Leave a Comment

Deepfakes Are Going To Wreak Havoc On Society. We Are Not Prepared.

In the months and years ahead, deepfakes threaten to grow from an Internet oddity to a widely destructive political and social force. Source: Deepfakes Are Going To Wreak Havoc On Society. We Are Not Prepared. Best Of Deep Fakes Compilation Funniest DeepFakes *Compilation* II. Download a Security Risk Assessment steps paper! Download a vCISO template […]

Leave a Comment

Hackers steal secrets from US nuclear missile contractor

Cyber extortionists have stolen sensitive data from a company which supports the US Minuteman III nuclear deterrent. Source: Hackers steal secrets from US nuclear missile contractor Download a Security Risk Assessment steps paper! Subscribe to DISC InfoSec blog by Email

Leave a Comment

Our latest InfoSec poll results

Please share your thoughts and vote, if poll has not expired yet. Download a Security Risk Assessment steps paper! Subscribe to DISC InfoSec blog by Email

Leave a Comment

State-Based Contact Tracing Apps Could Be a Mess

With no nationwide Covid-19 notification software in sight, security and interoperability issues loom large. Source: State-Based Contact Tracing Apps Could Be a Mess Big Tech’s Contact-Tracing Apps Might Make Things Worse | Mashable Coronavirus outbreak: What are the privacy risks behind ‘contact tracing’ apps? Ebola virus disease contact tracing activities, lessons learned Download a Security […]

Leave a Comment