Google Clamps Down on Malicious Sites

Malicious Sites that repeatedly violate Google’s safe browsing policies will be classified as repeat offenders, the company said last week. Common practice A small number of websites take corrective actions after Google displays alerts on their landing pages warning visitors that they’re harmful. However, they typically revert to their old strategies. After Google goes through the process of verifying that they’re safe and removing the warnings, the pattern of violating policies often returns. Google verification procedures may launch automatically, or…

Cybersecurity college to open at Bletchley Park

Cybersecurity gets a new pillar. Great news, Bletchley Park is creating a cybersecurity college. Teaching 16-19-year-olds cybersecurity skills along with maths, physics, computer science and economics. What better place for the college to be located than at Bletchley Park. The UK’s hub of codebreaking during the second world war, where the infamous Enigma Code was deciphered.

US Navy data breach

The incident. The US Navy announces today a major personal data breach. Back in October, due to a breach in a contractor’s laptop, someone accessed more than 130,000 accounts of its enlisted men. HP Enterprise Services notified the US Navy of the breach. They reported the “compromisation” of one of the Navy’s laptops operated by their employee supporting a Navy contract. Data accessed includes the names and Social Security numbers of 134,386 current and former Sailors. The Navy confronts data breach head on.…

UK’s cybersecurity start-up accelerator program

Great news for cybersecurity The UK government has announced an initiative that will see it join forces with some of the country’s hottest start-ups. They will fund the development of a start-up accelerator program that will help protect the UK from cyber attacks.

Protect your code – protect your data

Responsibility for securing enterprise applications has been moving down the development lifecycle, and for good reason. It not only makes the enterprise obtain security, but also saves companies time and money. In this article, we can talk about code security and what its impact.

Transfer Stolen Data from Air-Gapped Computer by using HDD’s noise

According to the hackernews, a new way to stole data form air-gapped computer was found. The technique got the name “DiskFiltration” and it is as interesting as it sounds. Air-gapped computers are compuers isolated from the Internet and other devices. Specialists considered for a long time thaty they are the most secure and safest place for storing data in critical infrastructures such as: industrial control systems financial institutions classified military networks.

Guarding The Grid

Quietly and without much public recognition, the National Guard has been developing a sophisticated capability for cyberdefense. A few weeks ago I was on Capitol Hill at an event sponsored by the Lexington Institute discussing the growing role of the National Guard in protecting the nation’s critical infrastructure from cyberattacks — specifically the electric power grid. Risks to US critical infrastructures are growing significantly; the Department of Homeland Security reported a seven-fold increase in cyber incidents on critical infrastructures between…