Wednesday, January 22, 2020
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST
Home News Page 238

News

Quora data breach: hackers obtained information on roughly 100 million users

Another day another illustrious victim of the data breach, the popular question-and-answer website Quora suffered a major data breach that exposed 100 million users. On Monday, the popular question-and-answer website Quora suffered a major data breach, unknown hackers breached its systems...

RSAC 2018 – Incredible Show – Innovative Winners!

Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine has spent the past six months scouring the globe and found nearly 3,000 companies who create and offer the most respected information security products and services. From just...

European Space Agency domains hacked by Anonymous

The collective Anonymous has compromised the subdomains of the European Space Agency website and leaked personal information of thousands of subscribers and officials. The hacking collective Anonymous seems to be very active in this period, its last victim is the European Space...

2020 – The Year of The Weaponized Internet

By Darren Anstee, Chief Technology Officer, SBO International, NETSCOUT The risk posed by the weaponization of internet infrastructure for DDoS attack generation will be a hot topic for ISPs once again in 2020. Hackers continue to use reflection amplification techniques...

Weaknesses in Air Traffic Control Systems are a serious issue for FAA

A GAO report to FAA reveals that the systems adopted in the Aviation industry are still affected by weaknesses that could be exploited by hackers. A report published by Government Accounting Office (GAO) in January urges the Federal Aviation Administration (FAA) to adopt a...

GCHQ Gaffer database goes open source

The British intelligence agency GCHQ has released the Gaffer database as an open source project. Gaffer is sort of database written in Java that makes it "easy to store large-scale graphs in which the nodes and edges have statistics such as counts,...

Hackers tried to cause a blast at a Saudi petrochemical plant

Hackers tried to cause a blast at a Saudi petrochemical plant A new cyber attack against a Saudi petrochemical plant made the headlines, hackers attempted to hit the infrastructure in August. Do you remember the powerful cyber attack that in 2014 hit...

Know Who to Call When Phishing Strikes

By Russ Cohen As a former "white hat hacker” helping businesses improve cybersecurity by illuminating areas of vulnerability, one of the more creative aspects of my job was crafting a convincing phishing attack. The objective was to construct an email...

Chicago student charged with writing code to spread ISIS propaganda

US authorities arrested Thomas Osadzinski, a student at DePaul University, because he allegedly built a custom Gentoo Linux distro for ISIS. Thomas Osadzinski (20), a student at DePaul University, Chicago, was arrested because he allegedly built a custom Gentoo Linux...

Cyber Risk & Insurance: A Game Plan

By Jenny Soubra, U.S. Head of Cyber, Allianz Global Corporate & Specialty Clients often ask me for a playbook: Cyber Risk Mitigation for Dummies, as it were. In large part, I understand the request. Humans love certainty. Risk managers love...

STAY CONNECTED

35,916FansLike
56,050FollowersFollow
Show Buttons
Hide Buttons