A false sense of security.
Last time we spoke about blockchain. It is true that cryptocurrencies can feel secure because they decentralize and often anonymize digital transactions.
Let’s see what we can do to guard our selves against a swath of common attacks. Continue reading “Keeping your cryptocurrencies safe and secure.”
Cybersecurity gets a new pillar.
Great news, Bletchley Park is creating a cybersecurity college. Teaching 16-19-year-olds cybersecurity skills along with maths, physics, computer science and economics. What better place for the college to be located than at Bletchley Park. The UK’s hub of codebreaking during the second world war, where the infamous Enigma Code was deciphered.
Continue reading “Cybersecurity college to open at Bletchley Park”
The US Navy announces today a major personal data breach. Back in October, due to a breach in a contractor’s laptop, someone accessed more than 130,000 accounts of its enlisted men.
Continue reading “US Navy data breach”
Great news for cybersecurity
The UK government has announced an initiative that will see it join forces with some of the country’s hottest start-ups. They will fund the development of a start-up accelerator program that will help protect the UK from cyber attacks.
Continue reading “UK’s cybersecurity start-up accelerator program”
Responsibility for securing enterprise applications has been moving down the development lifecycle, and for good reason. It not only makes the enterprise obtain security, but also saves companies time and money. In this article, we can talk about code security and what its impact.
Continue reading “Protect your code – protect your data”
Specialists believe that cyber attackers used the toolkit, dubbed “HOMEKit” by Palo Alto Networks, to generate malicious Microsoft Word documents for various campaigns since 2013. Similar to the MNKit exploit generator, HOMEKit relies on the CVE-2012-0158 vulnerability in Office to deliver malware.
Continue reading ““HOMEKit” the Exploit Generator Used to Deliver Espionage Malware”
According to the hackernews, a new way to stole data form air-gapped computer was found. The technique got the name “DiskFiltration” and it is as interesting as it sounds. Air-gapped computers are compuers isolated from the Internet and other devices. Specialists considered for a long time thaty they are the most secure and safest place for storing data in critical infrastructures such as:
- industrial control systems
- financial institutions
- classified military networks.
Continue reading “Transfer Stolen Data from Air-Gapped Computer by using HDD’s noise”
Israel will consolidate the strands of its cyber-security apparatus under one roof, according to the coutry’s parliament, the Knesset.
Continue reading “Israeli parliament recommended the creation of national central cyber-authority”
Quietly and without much public recognition, the National Guard has been developing a sophisticated capability for cyberdefense.
A few weeks ago I was on Capitol Hill at an event sponsored by the Lexington Institute discussing the growing role of the National Guard in protecting the nation’s critical infrastructure from cyberattacks — specifically the electric power grid. Risks to US critical infrastructures are growing significantly; the Department of Homeland Security reported a seven-fold increase in cyber incidents on critical infrastructures between 2010 and 2015.
Continue reading “Guarding The Grid”