Data Security: Hot Stories

Search Result for cyber in All Fields - Top 20 Stories

 Search Stories
Hot Words
Key Words
In Field



 Search Result for cyber in All Fields - Top 20 Stories
Chinese Hacker Groups To Shift Focus To India In 2018
Hackers aren't identical to criminals, although common people usually feel the risks from them and even leak data or lose money. Some hacker groups are actually backed by nation-states, called as APTs (Advanced Persistent Threat). It's one reason why cyber security situation is worse and malware is more. The recent reports disclosed Chinese APT groups are shifting focus in 2018 to India and other south Asia counties as a part of Beijing's global market goal. It's time to check if your data center is safe...
By Indo-Asian News  View Source  
Hacking the House: MPs Have to Care about Cyber Security
Is it common to share login passwords with your colleagues? At least this happens in the House of Commons. If an assistant can login to a MP's computer and somehow uses it to view pornography, the story isn't just limited in broken office code. The true risk is these sort of websites are the main distributers of malware, either spyware or ransomware. Considering the MP's computers have lots of classified data and files, hackers may get inspiration from recent porn website scandal there...
By Rory Cellan-Jones  View Source  
North Korean Malware Still Lurks in Computers Worldwide
The US Department of Homeland Security issued an alert about a hacker group "Hidden Cobra" also known as "Lazarus" that run a victims' networks and may launch further network exploitation. This hacker group is believed related to North Korea. Last month, Britain had blamed the country for being behind the WannaCry cyber attack in May. The malware had infected lots of computers of 150 countries, and even some Britain's hospitals had to cancel scheduled operations. FBI doubts Volgmer "backdoor Trojan" is the next...
By WION Web Team  View Source  
Kaspersky Confirms It Downloaded Secret NSA Tools
Kaspersky is anti-virus and cyber security company. If someday you hear it steal hacker tools from NSA, aren't surprised. Hackers and anti-virus software are actually in same industry and share same technology base. The U.S. government ordered Kaspersky's software to be removed from government owned computers last month because of meddling in the 2016 presidential election. Now the questions is: The security software is safe itself?
By Shane Savitsky  View Source  
Trend Micro Is Fighting Locky Ransomware Variants
Locky ransomware isn't new, but recent weeks an alert is urgent: one variant of this ransomware is coming under one of the largest malware campaigns in the second half of 2017: 23 million spam emails. According to Trend Micro, the ransomware is not likely to be on the scale of 'Wannacrypt' and 'Petya' that relied on Microsoft vulnerability in Windows XP. Only if you deal with the spam email in right way: delete it...
By IANS  View Source  
US Navy Collisions Stoke Cyber Threat for GPS Systems
This 4 US navy war ships got collision accidents in close areas. Each case seems having own cause but the Pentagon also doubts there are some connections among them, especially electronic guidance systems that the navy relies heavier and heavier in past decades are now an target of cyber attack. For example, some reports uncovered GPS is in short list of hackers' targets...
By Tribune News  View Source  
U.S. employee data breach tied to China Hackers
Even if your data and your family members' data are collected and kept by US government, they aren't safe as the government promised. A Chinese hacking group is suspected of stealing sensitive information about millions of current and former U.S. government employees. FBI arrested some of the group by noticed "Deep Panda's", a hacker tool also used in Hong Kong to monitor democracy force, may hacked sensitive information of about 22.1 million federal employees, including their families and friends...
By Joseph Menn  View Source  
Rehab Camp for Young Cyber-Attackers on Right Track
Cyber attack is crime, but never fun. The worse and worse cyber safety issue is largely due to some teenagers never think cyber attack is definitely a crime and risks to be put into jail, so that ruin life on crime entrance. Using a key to try other's door is a crime, so is to try other's email. However teenagers possibly don't completely agree with this. To decrease the cyber attacker's base, and divert young attackers away from a life of crime, NCA will run rehab camp to help them back to...
By BBC Technology  View Source  
Cyber Attack Sweeps Globe Seems WannaCry Linked
A new global computer virus attacked from Tuesday; many Russian and Ukrainian targets, like oil companies and banks, are attacked by a virus similar to the ransomware WannaCry. The virus copied codes from earlier ransomware campaigns known as "Petya" and "GoldenEye." Technically, it's not a new one; but it's more aggressive in spreading and attacking. The good news is update patch for WannaCry may protect some machines from the new virus...
By Jack Stubbs  View Source  
The World Is Not Ready For Cyber Attack
Cyber attack is a high frequent word in information industry as well as in social news. When people talk about it, it seems at least some of us knew the threat and can deal with whatever. The truth isn't so optimistic. The NSA is supposed to run as a info security agency, however, its by-products - cyber weapons or say back doors - are stolen ...
By NICOLE PERLROTH  View Source  
Reinforce Small and Medium Enterprise Against Cyber Threats
For small or medium size enterprise (SME) cyber security is a special challenge. Its cash or budget isn't as much as big guys, but its cyber risk is as same as latter. SME, many of them are in private sector, usually cannot afford a solid team or service to protect from cyber threats. They have to compromise some information security requirement in view of pure business pursuit. However, there are still some effective ways for them to drive cyber threats away...
By Sneha Paul  View Source  
What have we learned from WannaCry
WannaCry demos a sample of ransomware, which has been a growing threat in recent years. Cyber security is a key area of FBI. It said more than 4,000 ransomware attacks every day since 2016. In cyber space ransom seems easier , lower cost, and much higher frequent. The WannaCry ransomware attack gives computer owners a surprise as well as a lesson: how to defend from cyber ransom is becoming a question widespread ...
By Michelle Drolet  View Source  
WannaCry and Ransomware is Active on May
Ransomware is to demand money after launching security attack. This May large scale ransomware attacks are reports in many countries. WannaCry is one the them; its name is telling the world not to touch me, or your bad day is coming. The NHS once suffered a major cyber attack and had to cancel some operations countrywide. In China, the thing even became worse. Thousands of gas stations' computer systems had been down to follow a ransomware warning....
By Cara McGoogan  View Source  
Netflix Incident and Cyber Extortion Campaigns
Recently Netflix is focused among information security topics. Some attackers declared to expose its data or disrupt its web site by DDoS unless the organization pays ransoms. 10 unaired episodes from Season 5 of Netflix’ hit series "Orange Is The New Black" have been leaked. It shows that ransomware is not the only form ...
By Jai Vijayan  View Source  
Cybersecurity Startup Exposed Hospital Data in Demos
From time to time, we heard stories of data leak. There are so many ways and causes. But can you imagine your data are exposed because a security startup demonstrated its unbeatable features? The network of El Camino Hospital, based in Santa Clara, California was such a victim for years. As reports of Wall Street Journal, hundreds of presentations probed it...
By Jeremy Kirk  View Source  
5 biggest cybersecurity questions answered
Everything changes, either quickly or slowly. Cyber security is in the fastest end. Some horrible things is in front of you, but you even never heard it before. How can I surf the web anonymously? Is it a question? Yes, because in most cases your internet activities or behaviors are collected and shared among venders. Can hackers access my webcam? The answer is hackers can get more than webcam if they are smart and evil enough...
By Gene Richardson  View Source  
5 Reasons Not Hire Cyber security Professional
Skilled cybersecurity professionals are easy to get job. By estimating, the talent gap will be over 1.8 million in five years. However, hiring a cyber security expert isn't easy reversely. The related opening sometimes lasts for months in at least 55% organizations. It's difficult for them to decide the hiring is right or not. The most common reasons are 5:...
By Alison DeNisco  View Source  
Cyber security Wizards Come from Hogwarts?
Oxford, Cambridge, or Hogwarts? New cyber security experts don't come from Hogwarts. Let's view the history, the government ran some ultra-secret code & cipher schools to prepare talents for World War Two. For current information safety circumstance, the government needs more hands and minds to keep data secure. The real wizards won't come from fake schools like Hogwarts...
By Mark Flegg  View Source  
Blackmail David Beckham: 1 M Or Email Leak
David Beckham is usually in news. This time he becomes a keyword in computer security pages. He and his team refused blackmailers a deal of a £1 million. The sequence was some negative emails really leaked. David did a right thing: say no to cyber criminals. But now the society starts to move the focus to what he said in private emails...
By Kenina Christi  View Full Paper  
Don't Do Cyber Crime If Can't Do Jail Time
You may heard the old adage "Don't do the crime if you can't do the time". It's the same to young cyber criminals. A 17-year-old was sentenced to 12 months rehabilitation after hacking British telecom; another 17-year-old was sentenced to four years in Massachusetts for leading a group of villainous hackers. Hacker sometimes means go to jail.
By Steve Morgan  View Source  View Cache