Loading...
News2019-09-17T17:24:23-05:00

Texan Admits Data Center Bomb Plot

From: Infosecurity Magazine -

Texan Admits Data Center Bomb Plot

A man from Texas could be facing up to 20 years in prison after pleading guilty to plotting to blow up a data center in Virginia.

Seth Aaron Pendley, of Wichita Falls, was arrested in April after trying to purchase what he believed to be an explosive device from an undercover FBI employee in Fort Worth.

The 28-year-old admitted that he had planned to use the device to destroy servers

... Keep reading this article at Infosecurity Magazine

New Jersey Councilor Charged with Cyber-harassment

From: Infosecurity Magazine -

New Jersey Councilor Charged with Cyber-harassment

A councilor from New Jersey has been arrested and charged with waging a campaign of cyber-harassment against a former girlfriend. 

Detectives from the Cape May County Prosecutor's Office, with the assistance of detectives from the Middle Township Police Department, launched an investigation into the activities of 43-year-old realtor and Cape May councilman Christopher Bezaire in May 2021 after allegations of cyber-abuse were made. 

Bezaire, who is the president of the

... Keep reading this article at Infosecurity Magazine

Colorado Passes New Privacy Act

From: Infosecurity Magazine -

Colorado Passes New Privacy Act

The Centennial State has unanimously passed a new data privacy act to safeguard Coloradoans' personal information.

On June 8, the state Senate approved the Colorado Privacy Act after a series of revisions were made. The Act is due to take effect on July 1, 2023, and now awaits the signature of state governor Jared Polis. 

Should the Act become law, Colorado will follow California and Virginia by enacting comprehensive privacy legislation.

The

... Keep reading this article at Infosecurity Magazine

Google Spices Up Supply China Security with SLSA Framework

From: Infosecurity Magazine -

Google Spices Up Supply China Security with SLSA Framework

Google has proposed a new framework to mitigate the growing risks posed by attacks on the software supply chain.

The Supply Chain Levels for Software Artifacts (SLSA, pronounced “salsa”) is designed to ensure the integrity of software artifacts across the entire supply chain.

It’s based on Google’s own Binary Authorization for Borg framework, which the tech giant has been using as standard for all its production workloads

... Keep reading this article at Infosecurity Magazine

Infosecurity Europe 2021 Postpones Live Event

From: Infosecurity Magazine -

Infosecurity Europe 2021 Postpones Live Event

Infosecurity Europe has announced that it is postponing the live event due to run at London Olympia in July, following the government’s delay in lifting the final COVID-19 restrictions.

Infosecurity Europe will instead deliver a virtual exhibition and conference from 13-15 July 2021, the original dates of the event. The in-person event will now be held in 2022.

The plan, before government restriction lifting was delayed, was to combine both

... Keep reading this article at Infosecurity Magazine

Novel Phishing Attack Abuses Google Drive and Docs

From: Infosecurity Magazine -

Novel Phishing Attack Abuses Google Drive and Docs

Enterprising cyber-criminals have found a way to create convincing phishing emails which abuse Google Docs and Drive functionality to bypass security filters, according to Avanan.

Researchers at the email security vendor claimed this is the first time such techniques have been used to piggyback on a popular service like Google’s.

The email that victims receive contains what appears to be a legitimate Google Docs link, Avanan

... Keep reading this article at Infosecurity Magazine

Carnival Confirms Another Breach Impacting Staff and Passengers

From: Infosecurity Magazine -

Carnival Confirms Another Breach Impacting Staff and Passengers

One of the world’s largest cruise ship operators has disclosed a data breach from mid-March, impacting an unspecified number of customers, employees, and crew.

Carnival Corporation runs many of the globe’s leading cruise lines, including P&O, Cunard and Carnival Cruise Line.

According to a data breach notification letter sent to customers and seen by Infosecurity, the firm detected unauthorized third-party access to a “limited number” of email accounts

... Keep reading this article at Infosecurity Magazine

A Billion CVS Records Exposed

From: Infosecurity Magazine -

A Billion CVS Records Exposed

More than a billion records were exposed after a misconfiguration error left a CVS Health cloud database without password protection.

The 240GB of unsecured data was discovered by WebsitePlanet and security researcher Jeremiah Fowler in a cooperative investigation. 

Because of the security oversight by CVS Health, which owns CVS Pharmacy and Aetna, a total of 1,148,327,940 records were exposed.

Information that was left publicly accessible to anyone who knew how to look for

... Keep reading this article at Infosecurity Magazine

Australia Suffers Widespread Internet Outage

From: Infosecurity Magazine -

Australia Suffers Widespread Internet Outage

Australians' lives were disrupted on Thursday by a widespread internet outage that impacted the country's mail service and multiple businesses, including banks and airlines.

The outage began in the early hours and was caused by a problem at Akamai Technologies, a global content delivery network (CDN) and cybersecurity and cloud service provider. 

Akamai, which is based in Cambridge, Massachusetts, has acknowledged the issue, but has not yet disclosed the cause of

... Keep reading this article at Infosecurity Magazine

Hackers Can Spy on Peloton Workouts

From: Infosecurity Magazine -

Hackers Can Spy on Peloton Workouts

Peloton bike users could be spied on while working out, according to new research by McAfee's Advanced Threat Research team.

The team discovered a vulnerability (CVE-2021-3387) in the touchscreen of the $2,495 Bike+ that allows it to be controlled remotely by a threat actor without any interference to the equipment's operating system.

Hackers could exploit the flaw to install malicious apps that spoof Netflix or Spotify to steal personal details and

... Keep reading this article at Infosecurity Magazine
  • Week in security with Tony Anscombe
    5 steps to take to minimize damage from a ransomware attack – The double-edged sword of OSINT – Watch out for vishing scams The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
  • 5 essential things to do before ransomware strikes
    By failing to prepare you are preparing to fail – here’s what you can do today to minimize the impact of a potential ransomware attack in the future The post 5 essential things to do before ransomware strikes appeared first on WeLiveSecurity
  • Most health apps engage in unhealthy data‑harvesting habits
    Most medical and fitness apps in Google Play have tracking capabilities enabled and their data collection practices aren’t transparent The post Most health apps engage in unhealthy data‑harvesting habits appeared first on WeLiveSecurity
  • OSINT 101: What is open source intelligence and how is it used?
    OSINT can be used by anyone, both for good and bad ends – here’s how defenders can use it to keep ahead of attackers The post OSINT 101: What is open source intelligence and how is it used? appeared first on WeLiveSecurity
  • Microsoft takes down large‑scale BEC operation
    The fraudsters ran their campaigns from the cloud and used phishing attacks and email forwarding rules to steal financial information The post Microsoft takes down large‑scale BEC operation appeared first on WeLiveSecurity
  • Digital acceleration at Stanley Black & Decker places data at the center
    For Stanley Black & Decker, digital technologies are transforming every aspect of the company, from internal operations to customer experience to the products and services themselves. Recently, I spoke with Rhonda Gass, CIO, about her approach to strategy, architecture, and change management as well how her CIO role is evolving now and into the future.What […]
  • The great cloud computing surge
    Driven in part by the pandemic, cloud computing adoption has reached new heights. These five articles take a close look at the implications.
  • BrandPost: Episode 5: Putting Your CIAM Model to Work on a Continuous Basis
    In this fifth and final episode of our 5-episode podcast, The C-level Strategic Guide for CIAM Investment, we will explore phase 4 on the CIAM Maturity Curve: Continuous. Customer identity and access management, or CIAM, is fundamentally about “making sure the right people have access to the right things for the right amount of time,” says […]

DEFCON HACKING CONFERENCE 2020

CYBER SECURITY IN THE NEW AGE

Originally started in 1993, it was a meant to be a party for member of “Platinum Net”, a Fido protocol based hacking network out of Canada. As the main U.S. hub I was helping the Platinum Net organizer (I forget his name) plan a closing party for all the member BBS systems and their users. He was going to shut down the network when his dad took a new job and had to move away. We talking about where we might hold it, when all of a sudden he left early and disappeared. I was just planning a party for a network that was shut down, except for my U.S. nodes. I decided what the hell, I’ll invite the members of all the other networks my BBS (A Dark Tangent System) system was a part of including Cyber Crime International (CCI), Hit Net, Tired of Protection (ToP), and like 8 others I can’t remember. Why not invite everyone on #hack? Good idea!.

Take The First Step.

PROTECT YOUR CITIZENS, CLIENTS, CUSTOMERS AND EMPLOYEES
Contact Us

What We Do:

Government Cyber provides state-of-the-art, military grade cyber security solutions for municipal, state and federal government agencies as well as corporate clients.

Security Solutions For:

News

Contact Us