Loading...
News2019-09-17T17:24:23-05:00

Next Generation Software Fills Some Gaps – But Agencies Still Need Accelerated Visibility and Control of Endpoints

From: Cyber Defense Magazine -

By Boyd White, Director, Technical Account Management, Tanium Endpoint management is critical as agencies try to secure the […]

The post Next Generation Software Fills Some Gaps – But Agencies Still Need Accelerated Visibility and Control of Endpoints appeared first on Cyber Defense Magazine.

... Keep reading this article at Cyber Defense Magazine

2021 Cybersecurity Outlook: The More Things Change, The More They Stay the Same

From: Cyber Defense Magazine -

By Nir Gaist, Nyotron, Founder Cybersecurity has gone through many phases over the last few decades. Today, we […]

The post 2021 Cybersecurity Outlook: The More Things Change, The More They Stay the Same appeared first on Cyber Defense Magazine.

... Keep reading this article at Cyber Defense Magazine

Facebook Removes 16k Groups for Trading Fake Reviews

From: Infosecurity Magazine -

Facebook Removes 16k Groups for Trading Fake Reviews

Social media giant Facebook has removed thousands of groups from its platforms over the trading of fake and misleading reviews.

The cull occurred after two separate interventions by Britain’s competition watchdog, the Competition and Markets Authority (CMA).

In January 2020, Facebook committed to improving its identification, investigation, and removal of groups and other pages where misleading and fake reviews were being traded, and to preventing

... Keep reading this article at Infosecurity Magazine

US Jails Cyber-stalker Who Targeted Attack Survivor

From: Infosecurity Magazine -

US Jails Cyber-stalker Who Targeted Attack Survivor

The United States has imprisoned the cyberstalker of a woman who, as a child, survived a violent assault that claimed the life of her friend. 

According to court records, the victim was in a Texas bedroom with another girl in December 1999 when an assailant entered and slit both the little girls' throats. The perpetrator was later caught and convicted of the crime.

Alvin Willie George

... Keep reading this article at Infosecurity Magazine

LifeLabs Launches Vulnerability Disclosure Program

From: Infosecurity Magazine -

LifeLabs Launches Vulnerability Disclosure Program

Canada’s leading provider of laboratory diagnostic information and digital health connectivity systems today announced the launch of a new Vulnerability Disclosure Program (VDP).

LifeLabs Medical Laboratory started the VDP program with the intention of strengthening cybercrime detection technology across its online tools, apps, and solutions.

“Our goal is to continue to innovate and lead the health care industry in cybersecurity, offering the best protection and customer experience when accessing digital

... Keep reading this article at Infosecurity Magazine

New Cring ransomware deployed targeting unpatched Fortinet VPN devices

From: Cyber Defense Magazine -

Attackers are actively exploiting the CVE-2018-13379 flaw in Fortinet VPN to deploy the Cring ransomware to organizations in the […]

The post New Cring ransomware deployed targeting unpatched Fortinet VPN devices appeared first on Cyber Defense Magazine.

... Keep reading this article at Cyber Defense Magazine

NCSC: Large Number of Brits Are Using Easily Guessable Passwords

From: Infosecurity Magazine -

NCSC: Large Number of Brits Are Using Easily Guessable Passwords

A substantial proportion of Brits choose passwords that are easy for cyber-criminals to predict, leaving them vulnerable to hacking.

This is according to an independent survey carried out on behalf of the UK’s National Cyber Security Centre (NCSC). This found that when protecting their online accounts, people regularly use predictable passwords. These include pet names (15%), family members’ names (14%), a significant date (13%) and a

... Keep reading this article at Infosecurity Magazine

Learning from Recent Insider Data Breaches

From: Infosecurity Magazine -

Learning from Recent Insider Data Breaches

The security lessons organizations can take from insider attack trends were discussed by Neil Daswani, Co-Founder and Co-Director, Stanford Advanced Cybersecurity Program, during a RSAC 365 webcast.

Daswani, author of the recently published book Big Breaches: Cybersecurity Lessons for Everyone, began by outlining trends there have been in regard to the volume of insider data breaches. From the period 2005-2009, the average number per year was under 25, but this

... Keep reading this article at Infosecurity Magazine

#COVID19 Fraud Surge Threatens to Overwhelm Banks

From: Infosecurity Magazine -

#COVID19 Fraud Surge Threatens to Overwhelm Banks

Surging levels of fraud and financial crime during the pandemic threaten to overwhelm banking teams working from home with disjointed internal systems, according to new research from FICO.

The predictive analytics company commissioned Omdia to poll 110 senior executives supporting financial crime-fighting efforts in banks across the US, UK, Brazil, Germany, the Nordics and Canada.

In the UK, the vast majority (79%) of respondents cited remote working as having a

... Keep reading this article at Infosecurity Magazine

Hackers Hacked as Underground Carding Site is Breached

From: Infosecurity Magazine -

Hackers Hacked as Underground Carding Site is Breached

Thousands of cyber-criminals have had their personal data leaked online after a popular carding forum was hacked, according to Group-IB.

The Singapore-based security firm said it discovered that data belonging to users of the Swarmshop site was leaked to another underground forum on March 17.

“The database was posted on a different underground forum and contained 12,344 records of the card shop admins, sellers and buyers including their

... Keep reading this article at Infosecurity Magazine

UK Firms Suffer Record Number of Cyber-Attacks in Q1

From: Infosecurity Magazine -

UK Firms Suffer Record Number of Cyber-Attacks in Q1

There was no let up for UK businesses in the first three months of 2021, with commercial organizations suffering an 11% year-on-year increase in cyber-attacks during the period, according to Beaming.

The business ISP compiled the stats from analysis of traffic flowing to thousands of its corporate customers nationwide.

It claimed UK firms were hit by over 172,000 attacks each on average during the first quarter, the

... Keep reading this article at Infosecurity Magazine

College Track Coach Accused of Cyberstalking

From: Infosecurity Magazine -

College Track Coach Accused of Cyberstalking

Police in Chicago have arrested a former track and field coach for allegedly soliciting sexually explicit images from female athletes under false pretenses. 

Chicago resident Steve Waithe was arrested on April 7 and charged with one count of wire fraud and one count of cyberstalking. 

Waithe attended Loch Raven High School, where he was the Maryland State Champion in the triple jump. From 2014–15, the 28-year-old competed on Penn

... Keep reading this article at Infosecurity Magazine

Stimulus Stimulates Unemployment Scams

From: Infosecurity Magazine -

Stimulus Stimulates Unemployment Scams

The number of suspicious unemployment-related emails targeting Americans rose by 50% after the third round of stimulus checks was announced in late February, according to new data from Tessian’s threat intelligence team.

News of the phishing surge comes after the United States Department of Justice warned that fraudsters are creating websites mimicking unemployment benefit websites, including state workforce agency (SWA) websites, "for the purpose of unlawfully capturing consumers’ personal information."

Threat researchers found that during

... Keep reading this article at Infosecurity Magazine

Gigaset Android smartphones infected with malware after supply chain attack

From: Cyber Defense Magazine -

A new supply chain attack made the headlines, threat actors compromised at least one update server of smartphone […]

The post Gigaset Android smartphones infected with malware after supply chain attack appeared first on Cyber Defense Magazine.

... Keep reading this article at Cyber Defense Magazine
  • How Brunswick IT enables digital business
    Mike Adams joined Brunswick, the $4.3 billion manufacturing business, in 2017 to define its enterprise architecture function and to work with then CIO Danielle Brown to craft a modernization strategy. Since then, the company has sold off its non-marine businesses and is now fully focused on the marine market (its brands include Boston Whaler, SeaRay, […]
  • BrandPost: Episode 1: Introduction to CIAM and Why It’s Important
    If your customers and clientele don’t feel secure using your products and/or accessing your corporate websites, web portals, and web shops, they won’t sign up, share information, or otherwise engage with your brand. Developing a robust approach to customer identity and access management, aka CIAM, is essential for building this trust.But many CIOs and CISOs […]
  • Knowing where the line is in IT risk management
    Every organization should have an agreed understanding of risk, what that means for the company, and where the line of acceptability is (threshold). Knowing where this line is, and using it as a driving force for decision making within IT, can dramatically maximize resources and decrease costs. Decision making Risk Management sometimes has the unfortunate nickname […]

DEFCON HACKING CONFERENCE 2020

CYBER SECURITY IN THE NEW AGE

Originally started in 1993, it was a meant to be a party for member of “Platinum Net”, a Fido protocol based hacking network out of Canada. As the main U.S. hub I was helping the Platinum Net organizer (I forget his name) plan a closing party for all the member BBS systems and their users. He was going to shut down the network when his dad took a new job and had to move away. We talking about where we might hold it, when all of a sudden he left early and disappeared. I was just planning a party for a network that was shut down, except for my U.S. nodes. I decided what the hell, I’ll invite the members of all the other networks my BBS (A Dark Tangent System) system was a part of including Cyber Crime International (CCI), Hit Net, Tired of Protection (ToP), and like 8 others I can’t remember. Why not invite everyone on #hack? Good idea!.

Take The First Step.

PROTECT YOUR CITIZENS, CLIENTS, CUSTOMERS AND EMPLOYEES
Contact Us

What We Do:

Government Cyber provides state-of-the-art, military grade cyber security solutions for municipal, state and federal government agencies as well as corporate clients.

Security Solutions For:

News

Contact Us