Yearly Archives: 2019
Oh, my! PerCSoft’s Irony
By Charles Parker, II; MBA/MSA/JD/LLM/PhD PerCSoft is a Wisconsin business. The organization provides online data backup services for dental offices. This operates by placing data in the cloud. They had […]
Artificial Intelligence in Cybersecurity… Is The Glass Half-Empty or Half-Full?
A brief interview summary from the Digital Transformation EXPO Europe 2019 London, England – There’s a tremendous amount of buzz surrounding A.I. these days. Some believe it will present us […]
TrueDialog database leaked online tens of millions of SMS text messages
Millions of SMS messages have been leaked by a database run by TrueDialog, a business SMS provider for businesses and higher education providers. Security experts at vpnMentor discovered a database belonging to […]
TTEC – On The Cusp of Receiving the Federal “Seal of Approval”
New York, NY – TTEC is about to receive FedRAMP (moderate) certification in January 2020, and DoD IL4 certification a few months after that. How did they accomplish this esteemed […]
Hacker House exposes major security flaw in US election voting machines
DEMOCRACY IS NOT A GAME …Unless you’re placing your vote on a popular electronic voting machine – one used in at least 16 US States during local State and county elections in […]
RSA Conference Announces Initial 2020 Keynote Speakers
Bedford, MA – Dec 03, 2019 More Details on Additional Speakers and Session Content Coming Soon RSA Conference, the world’s leading information security conferences and expositions, today announced its initial […]
RevengeHotels campaign – crooks target the hospitality industry
RevengeHotels campaign – The hospitality industry continues to be a privileged target for cybercriminals that target hotels, restaurant chains, and tourism services. Security experts at Kaspersky have published a report […]
Facebook and Twitter warn of malicious SDK harvesting personal data from its accounts
Some third-party apps quietly scraped personal information from people’s accounts from Twitter and Facebook, the social media companies claim. Facebook and Twitter revealed that some third-party apps quietly scraped personal […]
3-D Secure: The Legacy Protocol Making a Comeback to Secure Online Payments
By Jennifer Singh Consumers today are spoiled for choice – which clothes to wear, gadgets to buy and payment networks to use to acquire these goods. The competition is tight […]
Data of 21 million Mixcloud users available for sale on the dark web
The online music streaming service Mixcloud was recently breached by a hacker that is attempting to sell stolen user data in a dark web marketplace. On Friday, the hacker that […]
8 Most Common Cyber-security Mistakes You Should Avoid in 2020 and Beyond
By Sam Chester Be it stolen customer data, phishing, or ransomware attacks, successful cyberattacks can affect businesses of any size and in any industry. A 2018 study by Juniper Research […]
The Weakest Points in Your Network are Your People
The Weakest Points in Your Network are Your People By Graham Walker, VP Marketing, Allied Telesis “Protect your network borders; don’t let the bad guys in!” This is a persistent […]
Two unpatched RCE flaws in rConfig software expose servers to hack
The popular rConfig network configuration management utility is affected by two critical remote code execution flaws that have yet to be patched. rConfig is a completely open-source, network configuration management utility […]
Chicago student charged with writing code to spread ISIS propaganda
US authorities arrested Thomas Osadzinski, a student at DePaul University, because he allegedly built a custom Gentoo Linux distro for ISIS. Thomas Osadzinski (20), a student at DePaul University, Chicago, […]
New NextCry Ransomware targets Nextcloud instances on Linux servers
NextCry is a new ransomware that was spotted by researchers while encrypting data on Linux servers in the wild. Security experts spotted new ransomware dubbed NextCry that targets the clients of the […]
5 Simple Ways to Protect Your Smartphone from Cyber Attacks
By Jamshaid Chaudhary, Kamil Web Solutions Where the onset of the internet has been a blessing for almost everyone, it has also proved to be a curse for many of […]
DDoS-for-Hire Services operator sentenced to 13 months in prison
Sergiy P. , the administrator of DDoS-for-hire services was sentenced to 13 months in prison, and additional three years of supervised release. Sergiy P. Usatyuk, a man that was operating […]
Microsoft Patch Tuesday updates fix CVE-2019-1429 flaw exploited in the wild
Microsoft’s Patch Tuesday updates for November 2019 address over 70 flaws, including an Internet Explorer issue (CVE-2019-1429) that has been exploited in attacks in the wild. Microsoft’s Patch Tuesday updates […]
3 Cybersecurity Trends & Predictions for 2020 (from Illumio)
By PJ Kirner, CTO & Founder of Illumio 1) “We’ll start to hear more about the convergence of physical infiltration with cyberattacks, challenging security across the board.” “Cyberattacks on an […]
Applying Security Across Heterogeneous IT Systems
Proactive Threat Interference® provides protection not offered by other cybersecurity approaches By Steve Ryan, CEO & Co-Founder, Trinity Cyber, Inc. Do I patch my system in the name of security, […]
What Does A Cyber Security Consultant Do?
By Stuart Cooke, Digital Marketing Manager at Evalian Are you considering becoming a cybersecurity consultant? Or perhaps you’ve recently become aware of the importance of this type of security and […]
A10 Networks Cloud Access Proxy Provides Secure Access and Visibility for SaaS Apps
By Yasir Liaqatullah, vice president of product management at A10 Networks A10 Networks today announced a new Cloud Access Proxy (CAP) solution that provides secure access to the software as a […]
The Importance of Cybersecurity When Dealing With Online Customers
By Riya The internet has become one of the most populated places ever known. With more businesses deciding to integrate, it is good to note that the level of insecurity […]
How to Stop Cybersecurity Attacks before They Start
By Dr. Johannes Bauer, principal security advisor, identity management & security, UL Cybersecurity breaches are part of the nasty reality of today’s IT infrastructure and even though they are not […]
Deceptively Simple Detection
by Carolyn Crandall, Chief Deception Officer and CMO, AttivoNetworks Emerging technologies come with a lot of promises and ROI expectations. Some move forward and thrive, while others just fade away. […]
Sprint Beta Testing 5G Smart City in Georgia
By Kayla Matthews, Freelance Writer, Productivity Bytes Sprint has started beta testing some of its new 5G technology in Peachtree Corners, Georgia. Though the test doesn’t encompass the whole city, it […]
Stressing Security Teams
By Jody Caldwell Workplaces create stress – it’s an unfortunate fact of life – work is stressful. Stress isn’t even terribly complicated. People stress out when they believe that demands […]
RSA Conference 2020 Introduces the RSAC Engagement Zone
New Dedicated Area for Peer-to-Peer Networking and Collaborative Learning Designed to Deepen Connections Among Cybersecurity Community at RSAC RSA Conference, the world’s leading information security conferences and expositions, today announced […]
New Cybersecurity Trend: Hackers Impersonating Other Hackers
By Jonathan Drake, Senior Intelligence Analyst at Optiv Security Cyber threat intelligence usually categorizes threat actors in fixed classes. While these classes may vary from organization to organization, typical threat […]
Software Defined Perimeter Deep Dive & Required Implementation Readiness
By Parthasarathi Chakraborty SDN, SDWAN & SDP have frequently encountered terminologies to the technology professionals these days. It is necessary to understand each of these terms before making any technology […]