A false sense of security.
Last time we spoke about blockchain. It is true that cryptocurrencies can feel secure because they decentralize and often anonymize digital transactions.
Let’s see what we can do to guard our selves against a swath of common attacks. Continue reading “Keeping your cryptocurrencies safe and secure.”
Great news that a cybersecurity college is going to be set up at Bletchley Park to teach 16-19-year-olds cybersecurity skills along with maths, physics, computer science and economics. What better place for the college to be located than at Bletchley Park, the UK’s hub of codebreaking during the second world war?
Continue reading “Cybersecurity school to open at Bletchley Park”
The US Navy announced today that the personal data of 130,000 of its enlisted men were accessed after a contractor’s laptop was breached back in October.
Continue reading “US Navy data breach”
The UK government has announced an initiative that will see it join forces with some of the country’s hottest start-ups to develop technologies that will help protect the UK from cyber attacks.
Continue reading “UK’s cybersecurity start-up accelerator program”
Responsibility for securing enterprise applications has been moving down the development lifecycle, and for good reason. It not only makes the enterprise more secure but also saves companies time and money.
Continue reading “Protect your code – protect your data”
The toolkit, dubbed “HOMEKit” by Palo Alto Networks, is believed to have been used to generate malicious Microsoft Word documents for various campaigns since 2013. Similar to the MNKit exploit generator, HOMEKit relies on the CVE-2012-0158 vulnerability in Office to deliver malware.
Continue reading ““HOMEKit” the Exploit Generator Used to Deliver Espionage Malware”
According to the hackernews, a new way to stole data form air-gapped computer is found. Air-gapped computers that are isolated from the Internet and other computers are long considered to be the most secure and safest place for storing data in critical infrastructures such as industrial control systems, financial institutions, and classified military networks.
Continue reading “Transfer Stolen Data from Air-Gapped Computer by using HDD’s noise”
The strands of Israel’s cyber-security apparatus are to be consolidated under one roof, according to the country’s parliament, the Knesset.
Continue reading “israeli parliament recommended the creation of national central cyber-authority”
Quietly and without much public recognition, the National Guard has been developing a sophisticated capability for cyberdefense.
A few weeks ago I was on Capitol Hill at an event sponsored by the Lexington Institute discussing the growing role of the National Guard in protecting the nation’s critical infrastructure from cyberattacks — specifically the electric power grid. Risks to US critical infrastructures are growing significantly; the Department of Homeland Security reported a seven-fold increase in cyber incidents on critical infrastructures between 2010 and 2015.
Continue reading “Guarding The Grid”