Data Security: Hot Stories

Search Result for Cyber Security in All Fields - Find 18 Stories

 Search Stories
Hot Words
Key Words
In Field



 Search Result for Cyber Security in All Fields - Find 18 Stories
Chinese Hacker Groups To Shift Focus To India In 2018
Hackers aren't identical to criminals, although common people usually feel the risks from them and even leak data or lose money. Some hacker groups are actually backed by nation-states, called as APTs (Advanced Persistent Threat). It's one reason why cyber security situation is worse and malware is more. The recent reports disclosed Chinese APT groups are shifting focus in 2018 to India and other south Asia counties as a part of Beijing's global market goal. It's time to check if your data center is safe...
By Indo-Asian News  View Source  
Hacking the House: MPs Have to Care about Cyber Security
Is it common to share login passwords with your colleagues? At least this happens in the House of Commons. If an assistant can login to a MP's computer and somehow uses it to view pornography, the story isn't just limited in broken office code. The true risk is these sort of websites are the main distributers of malware, either spyware or ransomware. Considering the MP's computers have lots of classified data and files, hackers may get inspiration from recent porn website scandal there...
By Rory Cellan-Jones  View Source  
Kaspersky Confirms It Downloaded Secret NSA Tools
Kaspersky is anti-virus and cyber security company. If someday you hear it steal hacker tools from NSA, aren't surprised. Hackers and anti-virus software are actually in same industry and share same technology base. The U.S. government ordered Kaspersky's software to be removed from government owned computers last month because of meddling in the 2016 presidential election. Now the questions is: The security software is safe itself?
By Shane Savitsky  View Source  
Reinforce Small and Medium Enterprise Against Cyber Threats
For small or medium size enterprise (SME) cyber security is a special challenge. Its cash or budget isn't as much as big guys, but its cyber risk is as same as latter. SME, many of them are in private sector, usually cannot afford a solid team or service to protect from cyber threats. They have to compromise some information security requirement in view of pure business pursuit. However, there are still some effective ways for them to drive cyber threats away...
By Sneha Paul  View Source  
What have we learned from WannaCry
WannaCry demos a sample of ransomware, which has been a growing threat in recent years. Cyber security is a key area of FBI. It said more than 4,000 ransomware attacks every day since 2016. In cyber space ransom seems easier , lower cost, and much higher frequent. The WannaCry ransomware attack gives computer owners a surprise as well as a lesson: how to defend from cyber ransom is becoming a question widespread ...
By Michelle Drolet  View Source  
5 biggest cybersecurity questions answered
Everything changes, either quickly or slowly. Cyber security is in the fastest end. Some horrible things is in front of you, but you even never heard it before. How can I surf the web anonymously? Is it a question? Yes, because in most cases your internet activities or behaviors are collected and shared among venders. Can hackers access my webcam? The answer is hackers can get more than webcam if they are smart and evil enough...
By Gene Richardson  View Source  
5 Reasons Not Hire Cyber security Professional
Skilled cybersecurity professionals are easy to get job. By estimating, the talent gap will be over 1.8 million in five years. However, hiring a cyber security expert isn't easy reversely. The related opening sometimes lasts for months in at least 55% organizations. It's difficult for them to decide the hiring is right or not. The most common reasons are 5:...
By Alison DeNisco  View Source  
Cyber security Wizards Come from Hogwarts?
Oxford, Cambridge, or Hogwarts? New cyber security experts don't come from Hogwarts. Let's view the history, the government ran some ultra-secret code & cipher schools to prepare talents for World War Two. For current information safety circumstance, the government needs more hands and minds to keep data secure. The real wizards won't come from fake schools like Hogwarts...
By Mark Flegg  View Source  
Hackers Guilty of Mining Millions from EA Game
The virtual money and online marketplace are targets of hackers too. A young guy from CA was found guilty not because he stole money from a US bank, but mined $16 million FIFA coins from a soccer game of EA. This isn't a first hack case related to virtual money, and higher value cases would come very soon in cyber security circumstances...
By Sean Buckley  View Source  
Donald Trump Unveiled Four-Part Cyber Security Strategy
President-elect Donald Trump disclosed his cyber security strategy, which is getting mixed reactions. Experts say it has some good ideas. "It sounds like a fairly rational, high-level playbook... but much of this is already being done to a certain extent," chief technology officer at Binary Defense Systems agreed with him...
By JOSE PAGLIERY  View Source  
Does Censorship Is A Way for Cyber Security
A new law related to cyber security is in table of Chinese law makers. The draft bill caused some controversial comments. For example, hackers aren't the key part there although they are the role in most of cyber attacks or accidents. Instead, government are granted to censor Internet. Cyber security has separate definitions by countries. In China, ...
By Reuters  View Source  
Cyber Security Experts Share Horror Stories
Recent DDoS attack across USA causes many topics, it's not only billions of dollars in lost but potentially harm individuals. From daily mobile malware to vulnerabilities with the electric grid, some cyber security experts share stories here. Hopefully, the unknown stories can help to defend the worst-case scenarios...
By Dan Patterson  View Source  
Hackers Released House Democrats Personal Information
This is a cyber security incident with political backdrop. All Democrats in House of Representatives may be involved with this leak. Lots of private cell phone numbers and email addresses will be public, ...
By ALEXANDER MALLIN  View Source  
Stanford launches new online courses in computer security
Staying ahead in the cyber security game is critical to defending against new threats. To protect against cybercrime, corporations, business and government must continuously update their security measures and keep employees properly trained. Since 2005, Stanford has provided professionals around the world with the opportunity to learn the latest...
By PRNewswire  View Source  
USF hacking demo exposes security weaknesses
Tampa, Florida -- Cyber security experts hosted education meetings at the University of South Florida to inform people how easy it is for hackers to get into systems. Home Depot, Target, JP Morgan, all are huge companies all have been hacked. "Most of the larger corporations are hacked to some extent and there is a risk that people don't see...
By Danica Lawrence  View Source  
12 tips from getting hacked
If we’ve learned anything about cyber security in 2014, it’s that hackers are becoming more of a threat than ever before. Within the past two months companies such as Microsoft, AOL, and eBay have been the victim of security breaches. And let’s not forget about the Heartbleed bug — a giant vulnerability that was discovered within an encryption...
By Lisa Eadicicco  View Source  
Israeli defence computer hacked via tainted email
Hackers broke into an Israeli defence ministry computer via an email attachment tainted with malicious software that looked like it had been sent by the country's Shin Bet secret security service, an Israeli cyber security firm said on Sunday. Aviv Raff, chief technology officer at Seculert, said the hackers earlier this month temporarily took...
By ALLYN FISHER-ILAN AND JIM FINKLE, REUTERS  View Source  
US government rarely uses best cyber security steps
The US government itself seldom follows the best cyber security practices and must drop its old operating systems and unsecured browsers as it tries to push the private sector to tighten its practices, technology advisers told President Barack Obama. "The federal government rarely follows accepted best practices," the President's Council of...
By Reuters  View Source