Watch Cyber Security Is It Your Time For Identity theft, Yet?

This course is about helping you to survive an identity theft, attempt to educate you on how to prevent a direct identity theft attempt, know what to look for and how not be the one who helped the thief take your personal information. With your new found knowledge take it to your family so they can avoid years of headaches.

Source: Watch Cyber Security Is It Your Time For Identity theft, Yet? | Prime Video


 Subscribe in a reader

Leave a Comment

Secure, Share & Edit All Your Files From Anywhere | Box

Secure File Sharing – 256-bit AES encryption

Secure File Sharing: Easily and securely share files—even sensitive or confidential ones—without worry.

Source: Secure, Share & Edit All Your Files From Anywhere | Box




 Subscribe in a reader

Leave a Comment

Flipboard says hackers stole user details | ZDNet

Extent of the hack is unknown, but Flipboard said hackers had access to its systems for almost nine months.

Source: Flipboard says hackers stole user details | ZDNet

Flipboard confirms database hack, resets all user passwords

  • InfoSec Breaches

  •  Subscribe in a reader

    Leave a Comment

    Cyberattacks against hospitals increased over 1000% last year

    Cyberattacks against hospitals increased over 1000% last year : cybersecurity IICS Delhi Ethical Hacking Digital Forensics services

    Source: Cyberattacks against hospitals increased over 1000% last year



    What happens when hackers attack a hospital?



     Subscribe in a reader

    Leave a Comment

    Uncovering Linux based cyberattack using Azure Security Center

    Azure Security Center, Microsoft’s cloud-based cyber solution helps customers safeguard their cloud workloads as well as protect them from these threats.

    Source: Uncovering Linux based cyberattack using Azure Security Center







     Subscribe in a reader

    Leave a Comment

    Maker of US border’s license-plate scanning tech ransacked by hacker, blueprints and files dumped online

    Perceptics confirms intrusion and theft, stays quiet on details

    Source: Maker of US border’s license-plate scanning tech ransacked by hacker, blueprints and files dumped online

  • Car Security
  • Security Breach
  •  
    Digital License Plates: Convenience or Privacy Risk?


     Subscribe in a reader

    Leave a Comment

    China, Leverage, and Values

    If there is a new tech cold war, it is one with shots fired over a decade ago, largely by China. The questions going forward are about both leverage and values.

    Source: China, Leverage, and Values

    5G is a war the US is about to lose warns DoD

    more on Cyber War

     

    Image result for Digital Cold War

    Jack Goldsmith: “The United States is Losing the Digital Cold War” | Talks at Google


    Leave a Comment

    Microsoft wants a US privacy law that puts the burden on tech companies

    On the first anniversary of #GDPR, Microsoft calls for a similar privacy law in the US that puts the burden on the companies that collect and use sensitive data.

    Europe’s privacy law went into effect nearly a year ago. It’s time for the US to catch up, the tech giant says.

    Source: Microsoft wants a US privacy law that puts the burden on tech companies

     

     

     Subscribe in a reader

    Leave a Comment

    Millions of Instagram influencers had their private contact data scraped and exposed

    Millions of Instagram influencers had their private contact data scraped and exposed

    A massive database containing contact information of millions of Instagram influencers, celebrities and brand accounts has been found online. The database, hosted by Amazon Web Services, was left exposed and without a password allowing anyone to look inside. At the time of writing, the database had over 49 million records — but was growing by […]

    Source: Millions of Instagram influencers had their private contact data scraped and exposed – TechCrunch


     Subscribe in a reader

    Leave a Comment

    AWS Security Profiles: Tracy Pierce, Senior Consultant, Security Specialty, Remote Consulting Services | Amazon Web Services

    In the weeks leading up to re:Inforce, we’ll share conversations we’ve had with people at AWS who will be presenting at the event so you can learn more about them and some of the interesting work that they’re doing. You’ve worn a lot of hats at AWS. What do you do in your current role, […]

    Source: AWS Security Profiles: Tracy Pierce, Senior Consultant, Security Specialty, Remote Consulting Services | Amazon Web Services


     Subscribe in a reader

    Leave a Comment

    Microsoft renewed its Attack Surface Analyzer, version 2.0 is online

    Microsoft has renewed its Attack Surface Analyzer tool (version 2.0) to take advantage of modern, cross-platform technologies.

    Source: Microsoft renewed its Attack Surface Analyzer, version 2.0 is online


     Subscribe in a reader

    Leave a Comment

    Virus Removal Tool

    Virus Removal Tool

    Free Virus Removal Tools to Secure Against Virus Infection, Including Conficker, Rootkits and More. Download the Free Sophos Virus Removal Tool Today.

    Source: Sophos Virus Removal Tool


     Subscribe in a reader

    Leave a Comment

    California is bringing law and order to big data. It could change the internet in the U.S.

       ⚖️ California is bringing law and order to big data ⚖️

    California Expands Consumer Privacy Protections | The California Consumer Privacy Act, or CCPA, gives residents of California the ability to request the data that businesses collect on them, demand that it be deleted, and opt out of having that data sold to third parties, among other things.

    The state’s attorney general wants to avoid a troubled rollout, à la Obamacare, when the far-reaching restrictions on user data go into effect on Jan. 1.

    Source: California is bringing law and order to big data. It could change the internet in the U.S.

    here’s the no paywall copy of the article… https://archive.fo/NmU9E


     Subscribe in a reader

    Leave a Comment

    Most popular programming languages on stack overflow

    Most popular programming languages


     Subscribe in a reader

    Leave a Comment

    Hacking the ‘Unhackable’ eyeDisk USB stick with Wireshark

    The paradox, the USB stick eyeDisk that uses iris recognition to unlock the drive could reveal the device’s password in plain text in a simple way.

    Source: Hacking the ‘Unhackable’ eyeDisk USB stick with Wireshark


     Subscribe in a reader

    Leave a Comment

    7 Types of Experiences Every Security Pro Should Have

    As the saying goes, experience is the best teacher. It’ll also make you a better and more well-rounded security pro.

    Source: 7 Types of Experiences Every Security Pro Should Have

     Subscribe in a reader

    Leave a Comment

    Hackers exploit Jenkins flaw CVE-2018-1000861 to Kerberods malware

    Hackers exploit Jenkins flaw CVE-2018-1000861 to Kerberods malware

    Threat actors are exploiting a Jenkins vulnerability (CVE-2018-1000861) disclosed in 2018 to deliver a cryptocurrency miner using the Kerberods dropper

    Follow the numbers in blue to understand each step.

    Threat actors are exploiting a Jenkins vulnerability (CVE-2018-1000861) disclosed in 2018 to deliver a cryptocurrency miner using the Kerberods dropper

    Source: Hackers exploit Jenkins flaw CVE-2018-1000861 to Kerberods malware




     


     Subscribe in a reader

    Comments (1)

    ICS-CERT warns of several flaws in the GE Communicator software

    ICS-CERT is warning of several vulnerabilities in the GE Communicator software, including hardcoded credentials and privilege escalation bugs.

    Source: ICS-CERT warns of several flaws in the GE Communicator software




     Subscribe in a reader

    Leave a Comment

    Unsecured SkyMed Database Exposed PII Data Of 137K Individuals

    Unsecured SkyMed Database Exposed PII Data Of 137K Individuals

    Reportedly, the unsecured SkyMed database exposed huge records having medical and personal information of US citizens online.

    Source: Unsecured SkyMed Database Exposed PII Data Of 137K Individuals



    ISO/IEC 27018:2014, 1st Edition: Information technology – Security techniques – Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors



    NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)

     Subscribe in a reader

    Leave a Comment

    Belgian programmer solves cryptographic puzzle

    Belgian programmer solves cryptographic puzzle – 15 years too soon!

    Belgian coder Bernard Fabrot just finished a 3.5-year computational marathon, solving a fascinating cryptopuzzle set at MIT back in 1999.

    Source: Belgian programmer solves cryptographic puzzle – 15 years too soon!

     

     Subscribe in a reader

    Leave a Comment