Thanks to developments in camera technology, mapping processes, and processing speeds, facial recognition has rapidly become an integral part of the authentication processes for a variety of hardware. The technology has garnered widespread awareness in the last 12 months as…
Category: Cybersecurity Insiders
How to achieve out-of-the box global IoT connectivity
The IoT world is developing at a tremendous pace, but while Cisco estimates that there will be more than 50 billion connected devices by 2020 globally, at the end of 2019 we’re only at 9 billion. So, what’s causing this…
Thales’ Central Issuance award win underlines growing role of Fintech innovation in Chile
Thales has just been recognized by Santander in Chile for our EMV card issuance solution, which has allowed the bank to create an infrastructure that enables it to customize cards on a large scale, without having to rely on partner…
Ransomware payments and downtime grew in 2019
Ransomware which is a file-encrypting malware has been tagged as the most disruptive cyber-attack of 2019. And this was confirmed by a study carried out by Connecticut based Cybersecurity firm Coverware. In a recent Ransomware Marketplace report released by Coverware,…
MOST EMPLOYERS DON’T PAY FULL COST OF CERTIFICATIONS
This post was originally published by (ISC)² Management. One of the most common complaints cybersecurity professionals voice about their employers is that they have to pay for certifications out of their own pockets. It’s not a trivial issue, since workers…
SWITCHING FROM OTHER FIELDS TO CYBERSECURITY IS PROFITABLE
This post was originally published by (ISC)² Management. Here’s a bit of good news for anyone contemplating a career in cybersecurity: Cybersecurity workers who started their careers in other fields tend to get paid more than career-long cybersecurity professionals, according…
SO YOU HAVE DECIDED TO BECOME CYBER SECURITY CERTIFIED, NOW WHAT?
This post was originally published by (ISC)² Management. Toward the end of 2019, I met many aspiring women and men who approached me and said, “Tony, I want to become cyber security certified, how do I do it?” Read more…
Ransomware attack on Tampa Bay Times
Tampa Bay Times, which happens to be one of the renowned American newspapers has admitted formally that it has become a recent victim of a ransomware attack. However, the good news is that no data related to the publication was…
Albany County hit by second Cyber Attack in January 2020
News is out that Albany County of New York was hit by a second cyberattack in just three weeks of January 2020. However, officials are confident that they will recover from this attack as soon as possible and will put…
Five key takeaways from European Utility Week 2019
This year’s European Utility Week represented an exciting opportunity for manufacturers and service providers to showcase the latest developments in the utilities space. With so much of the world’s attention rightfully focused on the climate crisis, and especially on reducing the impact of household emissions on the environment, the most…
Sodinokibi Ransomware attack on GEDIA
German automobile spare parts maker GEDIA is in news for wrong reasons. A hacking group related to Sodinokibi is threatening to publish data which it procured after encrypting the database of Gedia with the file-encrypting malware. News is out…
FTCODE Ransomware steals credentials and passwords
A Ransomware strain named FTCODE which has been in prevalence since 2013 is now been reintroduced into the web world by hackers with some new features and tools. Security experts claim that this file-encrypting malware is now capable of stealing…
Saudi Prince hacks Amazon Jeff Bezos WhatsApp number
At a glittering Hollywood party in April 2018, Jeff Bezos who happens to be the world’s richest man exchanged his WhatsApp phone number with Saudi Arabia’s Billionaire Mohammed Bin Salman. The objective of the former was to set up data…
How to identify phishing emails and what to do
Note:This blog was written by an independent guest blogger. Phishing scams remain one of the most widespread cybercrimes. A phishing scam can be as simple as getting someone to click on a link, attachment, or a picture of cute kittens.…
Kroll acquires Cybersecurity firm RP Digital Security
New York-based Risk consulting firm Kroll Inc, said that it has acquired Singapore based forensic and digital security firm RP Digital Security. Thus, the founder Rob Phillips of the latter is said to join the payroll of the former by…
Boss of Cybersecurity Firm launches DDoS Cyber Attacks on other companies
A co-founder of a Cybersecurity firm is said to have admitted to committing a cybercrime of hiring hackers to carry out cyberattacks against other companies. The culprit in a discussion is Tucker Preston from Georgia who confessed before the legal…
FireEye acquires Cloud Security startup Cloudvisory
FireEye which offers AI-based cybersecurity intelligence has made it official that it has acquired Texas-based Cloud Security startup Cloudvisory. Financial details of the deal were not disclosed. However, FireEye confirmed that its latest technology acquisition will help its customers integrate…
Hacker leaks Telnet passwords of more than 500,000 devices
According to a report published in the technology-based website ZDNet, a hacker published Telnet passwords of more than 500,000 devices which includes Telnet servers, home routers, and Internet of Things(IoT). A source from ZDNET says that the passwords were…
It is getting harder for us to prove who we are
I had an interesting experience the other day. I had to renew my driver’s license. In previous renewal cycles, this was no big deal. One could just visit the local Department of Motor Vehicles (with a bagged lunch since it…
Worldwide Cyber Threats in 2020
A report disclosing details about Cyber Threats that will prevail across the world in 2020 was released by Cybersecurity Firm Check Point early today. And it highlights the attack vectors and techniques which will be employed by cyber crooks to…
Ransomware attack on New Orleans Ernest N.Morial Convention Center
Ernest N.Morial Convention Center which happens to be located in New Orleans, Louisiana, United States is in news for all wrong reasons. It is said that the convention center which has hosted several NBA and PFL Events was hit by…
Google CEO Sundar Pichai wants AI to be regulated
Google CEO Sundar Pichai has urged the US and the European Union to coordinate and offer tools that can regulate the use of Artificial Intelligence (AI) technology. Speaking at the technology conference in Brussels, the Alphabet Inc’s Chief Executive Officer…
How to Survive a Cybersecurity Audit
If you’re in a regulated industry or serve customers that are, sooner or later you will probably have auditors examine your cybersecurity setup. This may be on the behalf of clients, or for your own internal corporate governance. No matter…
Cyber Attack on Mitsubishi Electric and China held as a suspect
Mitsubishi Electric which happens to be Japan’s largest electronic equipment manufacturer and supplier to the world has released an official confirmation early today that it has become a victim of a cyber attack sometime in June last year. The…
Android vulnerability leads to malware scare
Kaspersky Lab has found a serious vulnerability in the Android operating system which can be used by hackers to launch malware attacks and steal information related to the smartphone user and transmit it to the servers of cybercriminals. Named as…
Tinder Cyber Attack exposes 70K female photos for Catfishing
According to research carried out by Cybersecurity firm White Ops, hackers launched a cyberattack at some time last year to access images of over 70,000 females from the dating app which can be used for fraudulent cyber scams like Catfishing.…
Top Cybersecurity trends & predictions for 2020
It is that time of year again where we look forward to what cyber goodies the New Year brings. 2019 brought new records in data breaches, a rash of ransomware attacks, and a rise in state-sponsored cyber-attacks. Below is a…
Security and digital payments – growth finally meeting demand
Note:This blog was written by an independent guest blogger. Digital payments are the future of commerce, but security concerns have created a major barrier to their popularity. A study of businesses conducted by the influential PCI Security Standards Council found…
Should cities pay a ransomware demand?
UPDATE: In a “ripped from the headlines” moment, we have real world confirmation of the growing risk discussed in this article. Breaking news over the weekend revealed that both the city of New Orleans and New Jersey’s largest hospital network are…
Healthcare cybersecurity for 2020 and beyond
An independent guest blogger wrote this blog. block These days, effective cybersecurity in healthcare is as critical as ever. Last year, more than 32 million patients had their personal and medical information stolen in data breaches across the United States.…
How to identify phishing emails and what to do
Note:This blog was written by an independent guest blogger. Phishing scams remain one of the most widespread cybercrimes. A phishing scam can be as simple as getting someone to click on a link, attachment, or a picture of cute kittens.…
Business disruption now considered as biggest Cyber Threat than data thefts
As per a research conducted by Crowdstrike, business disruption is now feared to be the biggest cyber threat than just data theft for businesses- as cybercriminals are seeing the former as their main attack objective than the latter. Security researchers…
Web Browser options for data privacy seekers
For those who think its time that their browser is scooping up a lot of personal information than required, here are some 3rd party tools that can help browse and search- keeping your privacy intact and that too at ‘zero’…
Emotet malware attack on Email users at the United Nations
Email Users at the United Nations were targeted with sophisticated phishing attacks by Emotet malware operators. Reports are in that the operators who developed Emotet have now devised a phishing email campaign in the name of the Permanent Mission of…
Which security certification is for you (if any)
It is hard to look at an information security job posting without seeing some certifications desired. Some make sense and others not so much. I have looked at junior helpdesk positions asking for CISSP, and some of the roles at…
Ransomware attacks can be blocked with these firewall best practices
As ransomware attacks are hitting the news headlines, CIOs and CTOs are in a lookout for a permanent solution to curb such attacks on their IT infrastructure respectively. So, security analysts are suggesting the following firewall best practices to prevent…
More than 67 percent of healthcare organizations in the UK hit by a cyberattack
A survey conducted by a data security provider named Clearswift in the UK suggests that more than 67% of healthcare organizations were hit by a cyberattack last year most of which includes malware attacks, virus infection propagation through USB sticks…
Apple acquires Artificial Intelligence startup Xnor
Seattle based startup XNOR.ai which is basically into Artificial Intelligence is now reported to be a part of American Technology giant Apple Inc. Yes, the announcement comes early this week when Apple made it official that it is going to…
Why MSPs Should Care About Cybersecurity
As a Managed Service Provider (MSP), there are many things you need to focus on to be successful in your business. You have to be a subject matter expert in your particular area in order to convince companies to outsource…
Donald Trump lashes out at User Privacy Policy of Apple Inc
US President Donald Trump has sarcastically lashed out Apple Inc’s Boss Tim Cook on Tuesday by claiming that the technology giant’s User Privacy Policy is blocking his vision of making ‘America Great’! Tweeting his mind on the same, the…
US Election 2020 might be influenced by Russian Cyber Attacks
All these days we have been talking a lot about US elections 2016 and their outcome influenced by Russian hackers. Now, the time has come to forget the past and look into the future as the 2020 Election Polls are…
UK will repent for handing over 5G network upgrade to Huawei
Edward Lucas, a Britain based security analyst has stated in its recent post that handing the 5G network upgrade to Huawei in Britain is like giving your main door keys to a stranger- where there is no guarantee of his/her…
Google trending news headlines related to Cybersecurity
Firstly, the news headlines which are trending on Google and related to Cybersecurity happens to be an agreement made between Estonia and the United States. According to sources, both countries have recently signed an agreement to share cyber threat intelligence…
What will happen to Windows 7 support after January 15, 2020
Microsoft has already issued a warning that after early January 2020 all its Windows 7 PC will lose support from its company and might become super vulnerable to cyber attacks such as malware infections like Ransomware and such. In…
Artificial Intelligence to fuel Cyber Warfare
The relationship between Iran and America had deteriorated to such an extent that other countries are speculating a cyberwar to erupt at any moment. Technically speaking, cyberwar is a digital attack were computer viruses, DDoS campaigns and hacks are expected…
Security and digital payments – growth finally meeting demand
Note:This blog was written by an independent guest blogger. Digital payments are the future of commerce, but security concerns have created a major barrier to their popularity. A study of businesses conducted by the influential PCI Security Standards Council found…
Top Cybersecurity trends & predictions for 2020
It is that time of year again where we look forward to what cyber goodies the New Year brings. 2019 brought new records in data breaches, a rash of ransomware attacks, and a rise in state-sponsored cyber-attacks. Below is a…
How to secure a router from Cyber Attacks
Hackers nowadays are seen using routers as botnets to launch cyber attacks on large companies and organizations. So, in such circumstances, here are some steps that will help secure a router from cyber attacks. Changing Passwords- It is better if…
Ransomware attack on Albany Airport on Christmas 2019
Christmas 2019 went sour for a few of the staff members of the Albany International Airport as a ransomware attack is reported to have encrypted the entire database of the airport forcing the authorities to pay a ransom to a…
Information Security grabs attention at CES 2020
At the Consumer Electronics Show (CES) 2020 Las Vegas, startups have shown a lot of interest in detailing the facts on how they secure their user data and how they protect it to the core when a consumer uses either…
2019’S TOP 10 WEBCASTS
This post was originally published by (ISC)² Management. Continuing education allows cybersecurity professionals to stay in tune to the constant changes in the industry. (ISC)² provides webcasts throughout the year on various security-related topics to help keep you informed, as…
Four innovations changing the face of the financial industry
Technological advances and changes in customer expectations over recent years have made a huge impact on the banking and financial services sectors. In many cases, the transformation has been dramatic, with digital technologies enabling new services and totally resetting consumer…
Face/Off: Security challenges in the age of facial recognition
Facial recognition is rightfully held up as an accurate and secure method of safeguarding devices and ensuring more accurate identity proofing. It is, in essence, the new science of identity. But while facial recognition technology complements the need for ‘traditional’…
Glass Class: Cloud Security Priorities 2020
This post was originally published by Juan Lugo. In 2020, organizations must focus on improving their cloud security posture in order to protect corporate data. There are many opportunities for employee missteps causing inadvertent or even malicious exposure. Additionally, without safeguards, hackers…
The Rise of Insider Threats in Verizon’s DBIR
This post was originally published by Jacob Serpa. Each year, Verizon releases its Data Breach Investigation Report (DBIR). These reports evaluate the state of security each year, providing detailed statistics around leading vulnerabilities, which industries face the most breaches, and…
The evolution of smart cities: what provisions are vital for their success?
Cities are undergoing a wave of digital transformation. With rapid population growth and urbanization transforming the way we live, improving or even maintaining our current quality of life relies upon using resources more efficiently. To put this point into perspective,…
Mobile Security alert for Android and iOS WhatsApp users
To all those who are using Whatsapp messaging app on Android and iOS loaded smartphones, here’s a news piece that might be of your interest. The Facebook-owned the phone and video sharing platform has officially declared that it is going…
Cyber Attack penalty of £500,000 on Dixons Carphone
Dixons Carphone, which became a victim of a cyber attack in between 2017-2018, has been fined an amount of £500,000 by the International Commissioner’s Office (ICO). Officials from the ICO said that the penalty was imposed as the electrical and…
Chinese Malware on phones issued by the US Government
Surprisingly, the phones issued by the US government to those working for State approved assistance programs and low-income people are coming preloaded with Chinese malware says a survey conducted by a security company. Yes, what you’ve read is right!…
How to achieve out-of-the box global IoT connectivity
The IoT world is developing at a tremendous pace, but while Cisco estimates that there will be more than 50 billion connected devices by 2020 globally, at the end of 2019 we’re only at 9 billion. So, what’s causing this…
Why CJIS mobile compliance might be easier than you think
Guest blog By Andrew King, AT&T Global Account Director, MobileIron Although we just wrapped up National Cybersecurity Awareness Month in October, security professionals never take a break — because cybercriminals don’t either. That’s especially true for folks who work in law…
Meet the Snake Ransomware which encrypts all connected devices
The trouble with ransomware seems to be never-ending for online users as new ransomware named ‘Snake’ has evolved into the cyber landscape which encrypts all connected devices along with the targeted system. Detected by the MalwareHunter Team, Snake Ransomware…
Tiktok App is filled with Vulnerabilities
This certainly will be a bad news to all those 1 billion active users of Tiktok and the news is as follows- A recent research carried out by Cybersecurity Company Checkpoint has discovered that the video-sharing app Tiktok had two…
Travelex Cyber Attack hackers demanding £4.6M for 5GB data
A Cyber Attack made on eve of the New Year 2020 on the database of Travelex Foreign Exchange is again hitting the news headlines – mainly due to the demands of hackers. Reports are in that the hackers who…
Which security certification is for you (if any)
It is hard to look at an information security job posting without seeing some certifications desired. Some make sense and others not so much. I have looked at junior helpdesk positions asking for CISSP, and some of the roles at…
All I want for Christmas is secure IoT gifts!
The holiday season is upon us once more, and in that last-minute scramble to find presents for your loved ones, you may be searching for some more slightly left field ideas. Well, fear not! Our Internet of Things (IoT) gift…
Texas and Las Vegas become victims to Iran Cyber Attacks
As the world is expecting a World War 3 by this month-end between Iran and North America, Garvin Bushell, Vice President of Cyber World Institute thinks that the war will happen not with guns and bullets, but only through cyberattacks…
Accenture to acquire Symantec Cyber Security Business
Accenture, the IT services provider from Ireland has fairly announced yesterday that it is all set to acquire Symantec’s Cyber Security Business from Broadcom Inc soon. However, the financial terms of the deal and when the deal will be closed…
Cloud Security giant Cloudflare to acquire Browser Security startup S2 Systems
Cloudflare, a cloud security offering platform know to protect over 22 million websites around the world has announced that it is going to acquire Browser security startup S2 Systems from Kirkland, Washington for an undisclosed amount. In general, the…
Healthcare cybersecurity for 2020 and beyond
An independent guest blogger wrote this blog. block These days, effective cybersecurity in healthcare is as critical as ever. Last year, more than 32 million patients had their personal and medical information stolen in data breaches across the United States.…
How website security and SEO are intimately connected
Learning how to optimize your website can be a challenge. At one time, it was only about figuring out what Google wanted, which was largely keywords. Now, it’s much more complex. Google is focused on not only delivering high-quality, relevant…
Ransomware attack makes US Company employees lose jobs
All these days we have seen malware stealing data and locking down data access for a ransom. Now, here’s a piece of different news that might grab your attention. A company that was operating in the United States for 60…
Death Ransomware now evolves with a stronger encryption
Till November 2019, those who were spreading ‘Death Ransomware’ were just fooling people in believing that their computer files were encrypted and were asking them to pay a ransom. But now, in the New Year, 2020 things have turned little…
Ransomware attack on Canyon Bicycles
Canyon Bicycles, a Germany company which supplies racing bikes to the world says that a cyberattack on its IT infrastructure has encrypted all its files from being accessed- which suggests that attack was of ransomware variant. Founded in 2002…
Ransomware attacks could have cost the United States $7.5 Billion
Hackers holding hostage of data for a ransom leads to a ransomware attack and this is what turned into a profitable business for hackers in 2019. According to a survey, conducted by Cybersecurity firm Emisoft, the cost of ransomware attacks…
Cyber Attack on Austria and suspect is Russia Fancy Bear
Austria’s foreign ministry has issued a press statement yesterday admitting that a serious cyberattack took place on the database of its Ministry on Saturday and the suspect happens to be Russia’s Fancy Bear. The press statement adds that the…
Iran launched a cyber attack on US Website to retaliate Qasem Soleimani Assassination
It did not take much time for hackers from Iran to launch a cyber attack on a US website to retaliate against Qasem Soleimani’s Assassination. The killing of the Revolutionary Guard General on Friday made the Iran Cyber Security Group…
IN CASE YOU MISSED IT: RECAPPING SECURITY CONGRESS 2019
This post was originally published by (ISC)² Management. Security Congress 2019 was our largest and most in-depth cybersecurity education conference to date. Held over the course of three days in October, the event was jam-packed with more than 180 sessions…
Trend Micro offers the utmost Cloud Security platform named ‘Cloud One’
Japan-based Cybersecurity Company Trend Micro has announced the cloud platform named ‘Cloud One’ to customers from the beginning of this year 2020. This platform aims to offer businesses a secure platform to build their applications in the cloud. Technically speaking,…
Ransomware attack on Travelex leads to website shutdown
Ransomware attack on Travelex, which is into the business of foreign exchange, has forced the company staff to shut down the website. It’s reported that the website was targeted by a malware attack on the eve of the New Year…
Ransomware attack on Michigan School District
A file-encrypting malware attack is said to have led to the extension of winter holidays for pupils studying in Richmond Community Schools. And authorities say that the services will be brought back to restoration by the end of next week…
How to Make KYC Compliance Less Difficult for Banks
KYC compliance can be quite a hassle. But they are a necessary step for businesses to perform more secure and personalized transactions. This is most especially important for financial institutions like banks. KYC compliance ensures that you know the person…
US Maritime hit by a Ransomware attack
A Ryuk Ransomware attack is said to have made the Christmas 2019 celebration awful for US Coast Guard as the malware reportedly disrupted the federal agencies’ operations for more than 33 hours. Reports are now in that the file-encrypting malware…
Half of the global 815 Million Smart Speakers are putting users privacy at risk
Almost half of the 815 million smart speakers operating across the world are reported to be putting their user’s privacy at risk- says a survey conducted by IDC. Yes, this is what was discovered when the International Data Corporation (IDC)…
State-sponsored Chinese cyberattack was much worse than reported earlier
Last year, a report emerged in the media that China bagged hacking group named APT10 launched a cyber-attack campaign known as “Cloud Hopper” on 8 of the global renowned Managed Service Providers (MSPs). It was revealed the hackers spied on…
Here’s a list of Worst Ransomware Attacks of 2019
Demant Ransomware attack– The mitigation and data recovery costs are estimated to be between $80 million to $95 million- thus making the malware attack on hearing aid manufacture Demant ‘Number One’ in the list of Worst Ransomware Attacks of 2019.…
Facebook and Twitter bosses could be jailed in Britain for Data Privacy
If those heading companies like Facebook and Twitter fail to protect their user data in Britain, then there is a chance that they might be sentenced to a jail term for a specific period in the year 2020. Yes, this…
Cloud Security confidence surging up says Barracuda Networks
As more and more companies are making a quick approach towards public cloud, security has become a prime concern to them. However, the confidence is growing says a survey conducted by Barracuda Networks after it took responses from over 850…
Why CJIS mobile compliance might be easier than you think
Guest blog By Andrew King, AT&T Global Account Director, MobileIron Although we just wrapped up National Cybersecurity Awareness Month in October, security professionals never take a break — because cybercriminals don’t either. That’s especially true for folks who work in law…