Think your iPhone is safe from hackers? That’s what they want you to think…

Posted by & filed under Android, Apple, Cyber Security, Cyberattack.

Some zero-day exploits can fetch high prices. This week Zerodium announced that it will pay $2.5m to security researchers who provide exploits that allow the complete takeover of Android phones without requiring the target to click on anything. But the big news in the announcement was that Zerodium was valuing the same kinds of exploits on Apple’s… Read more »

What is CrowdStrike and why is it part of the Trump whistleblower complaint?

Posted by & filed under Cyber Security, IT and Politics, Politics.

The cybersecurity company CrowdStrike, which has been at the center of false conspiracy theories since 2016, is once again in focus after a White House transcript published on Wednesday revealed President Donald Trump brought it up in his July call with Ukrainian President Volodymyr Zelensky.In a complaint released on Thursday by the intelligence community, a whistleblower expressed confusion about… Read more »

Cameron Ortis: What we know so far about the Canadian national security case

Posted by & filed under Cyber Security.

The arrest of a senior Canadian intelligence official on allegations of stealing classified materials has shaken the international intelligence community. Cameron Ortis, a civilian member of Canada’s RCMP national police force, had access to intelligence from Canada’s global allies and has been charged with a number of offences under the country’s national security laws. Source:… Read more »

Behind the ‘business’ of hacking

Posted by & filed under Cyber Security, Cyberattack.

Real life is rarely as exciting or fraught with complications as the movies, except when it comes to businesses under attack. Cybercriminals around the world take hacking to the next level — stealing passwords, scraping credit card numbers and attacking the Internet of Things. That’s where “ethical hackers” like Sherri Davidoff come in, finding weaknesses and helping… Read more »

Phishing Attacks and Spear Phishing: What They are, Why They are Effective, and How to Prevent Them

Posted by & filed under Cyber Security.

Phishing attacks have been a way for malicious actors to compromise organizations at alarming rates over the years. In fact, a recent survey found that 83% of respondents experienced a phishing attack in 2018, and that a successful attack costs a mid-size enterprise organization $1.6 million. Unfortunately, most industry experts agree that phishing will also be one of the… Read more »

Beefing up security

Posted by & filed under Cyber Security.

MANY OF US have little more than a weak, reused password standing between our financial assets and a remote attacker—one armed with powerful tools and a database of passwords from security breaches. This is a losing battle. It’s the most likely way for weak computer security to put our finances at risk. Think this can’t happen… Read more »

Microsoft Unveils Azure Sentinel Cloud Security Program

Posted by & filed under AI/Artificial Intelligence, Cyber Security, Microsoft.

Microsoft Corp. unveiled two new cloud security services to help customers find and stop threats and manage their cyberdefenses by tapping experts from the software giant. Azure Sentinel, available for customer preview Thursday, is what’s called a Security Information and Event management tool. Microsoft said it’s the first of its type based in the cloud. The… Read more »

IoT is Coming Even if the Security Isn’t Ready: Here’s What to Do

Posted by & filed under Cyber Security, Internet of Things.

In a May study of 553 IT decision makers, 78% said they thought it was at least somewhat likely that their businesses would suffer data loss or theft enabled by IoT devices. Some 72% said the speed at which IoT is advancing makes it harder to keep up with evolving security requirements. Source: Wired Magazine Date: February 28th, 2019… Read more »