Latest News

Event : Cyber Security Summit: New York

Event : Cyber Security Summit: New York

The Cyber Security Summit connects cutting-edge solution providers with senior executives to analyze & diagnose cybersecurity flaws through interactive panels & round table discussions. Scheduled to occur on 15th of September, the annual New York Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative...

Industry Insight: Your Favorite Keyboard Could Topple the Entire Business

Industry Insight: Your Favorite Keyboard Could Topple the Entire Business

Criminals are using strategic cyber weapons—including manipulated, everyday hardware like keyboards and other Human Interface Devices (HID)—against commercial targets. Many companies believe that their top-of-the-line software defense solutions can provide a watertight seal of the system through real-time monitoring and predictive analytics. But what the typical CISO might fail to recognize...

Pentagon: Contractors Will Soon Be Held to Elevated Cyber Standards

Pentagon: Contractors Will Soon Be Held to Elevated Cyber Standards

The Defense Department in recent years has implemented heightened cybersecurity regulations to protect its sensitive data, and now it must hold its industry partners to the same standards as they face the same threats, the Pentagon’s top IT official said Friday. “The cyberthreat is not going away; we have to defend our networks and systems, and you’re part of that defense,” acting DOD CIO...

There Will Be a CISO in Every Campaign, Suggests Clinton's Campaign Manager

There Will Be a CISO in Every Campaign, Suggests Clinton's Campaign Manager

“You're definitely gonna see on the next presidential campaign, every campaign will have a CISO”, said Robby Mook, the manager of Hillary Clinton's presidential campaign, as he talked about the 2016 election hacking. “I think that concept was so wild to people that it was largely brushed back”, said Mook. “It was totally treated as spin, that it was a deflection from what really...

Cybersecurity Reboots Networking

Cybersecurity Reboots Networking

Software-defined networks (a.k.a security-defined networks or SDN2), combines networking and security technologies to dramatically improve traffic monitoring, analysis and response throughout networks and across technology platforms. At the same time, SDN2 could save global enterprises $17B a year in reduced security breaches. Most IT security solutions today take advantage of Moore's Law—that...

GreatHorn Raised $6.3 Million to Combat Spear-Phishing Attacks

GreatHorn Raised $6.3 Million to Combat Spear-Phishing Attacks

Belmont, Mass-based start-up GreatHorn announced 06.21.2017completion of a $6.3M Series A funding round led by Techstars Venture Capital Fund and .406 Ventures. The firm is bringing machine learning technology to the continuing threat and problem of targeted spear phishing. CEO Kevin O'Brien said, "What we do is plug into cloud email systems like Google and O365, and we look at all of the mail...

Symantec Denies Russia's Request for Source Code Access

Symantec Denies Russia's Request for Source Code Access

Security firm Symantec will no longer allow Russian authorities to inspect its source code, according to Reuters. "It poses a risk to the integrity of our products that we are not willing to accept," the company's Kristen Batch said. The worry is that by allowing the supposedly independent Federal Security Service (FSB) to examine source code, it would give Russia an inside view of potential...

$12 Billion in Fraud Loss Came from Data Breach Victims in 2016

$12 Billion in Fraud Loss Came from Data Breach Victims in 2016

Data breach victims are likely to someday become victims of fraud. Of the $16B in total fraud loss for 2016, $8.3B came from victims who had experienced a breach in the past 12 months and $12B arose from victims who had breached in the previous six years. These findings come from a Javelin Advisory Services report. Increasingly smaller financial institutions are becoming aware of the Internet's...

Reasons Why You Should Fortify Your iOS Passcode Today

Reasons Why You Should Fortify Your iOS Passcode Today

If you are an iOS user who doesn't use a passcode or uses the same passcode for everything, It’s time to toughen up. Here’s why: 1) You store contacts, emails addresses, pictures and videos, social media, work email, messages, Web browsing, payment card information, location history and much more. If you don’t protect it then the day you lose that device is the day someone much meaner than...

Interesting Tweet :

Interesting Tweet : "Politics keep Bumping CyberSafety"

Recently, The Cavalry recently aired clinical hacking simulations online. Cavalry is an focused on issues where computer security intersect public safety and human life. However, the simulation was bumped by the Senate Healthcare bill, and was postponed to early next week. Users who were interested in watching this will have to wait until next Tuesday (if not, later). Commenting on this issue,...

IRS Issues Warning on New Phishing Scam Targeting Tax Professionals

IRS Issues Warning on New Phishing Scam Targeting Tax Professionals

The IRS, state tax agencies, and the tax industry, as part of the Security Summit partnership, are warning tax professionals about new phishing emails claiming to be from a real U.S.-based preparer education firm seeking sensitive preparer data. With real client data, thieves can better impersonate the taxpayer when filing fraudulent returns for refunds. e-Services credentials, Electronic Filing...

Air Force Operationalizes Latest Cybersecurity Plans

Air Force Operationalizes Latest Cybersecurity Plans

The Air Force is now operationalizing several key elements in its cybersecurity plan. As part of this, Air Force leaders have established a new unit, The Cyber Resilience Office for Weapons Systems (CROWS). CROWS was engineered to recognize the growing scope and influence of the cyber domain necessary to strengthen cybersecurity for emerging platforms and existing platforms. Operationalizing...

Ransomware Families – and How to Tackle Them

Ransomware Families – and How to Tackle Them

SophosLabs recently looked at the most prolific ransomware families and attack vectors over a six-month period. Beginning with specific ransomware families, the labs found that Cerber and Locky were by far the most active. Cerber accounted for half of all activity during the period, and Locky made up a quarter of it. Cerber has undergone many mutations designed to circumvent sandboxes and...

Thailand among Top Ten for Malware in Asia

Thailand among Top Ten for Malware in Asia

Thailand ranks among the top 10 countries in Asia-Pacific for the number of malware attacks. "Thailand is still one of the countries across the region most at risk of malware threats, behind Bangladesh, Indonesia and Vietnam," said Keshav Dhakad, from Microsoft Asia. The threat risk here is comparable to conditions in the Philippines and Bangladesh, he said, while Hong Kong, Japan, and Singapore...

Anthem to Pay a Record $115M to Settle U.S. Lawsuits over Data Breach

Anthem to Pay a Record $115M to Settle U.S. Lawsuits over Data Breach

Anthem Inc. has agreed to settle litigation over hacking in 2015 that compromised about 79 million people's personal information for $115 million, which lawyers said would be the largest settlement ever for a data breach. The deal, announced Friday by lawyers for people whose information was compromised, must still be approved by U.S. District Judge Lucy Koh in San Jose, California, who is...

Employee 'Phishing' Expeditions Part of States' Cybersecurity Awareness Tools

Employee 'Phishing' Expeditions Part of States' Cybersecurity Awareness Tools

Officials in Missouri and Washington state acknowledged the sustained threat that phishing and spear phishing attacks present to the tens of thousands of state employees who may be vulnerable. But both CISOs said their agencies continue to warn staffers of the dangers of fast thinking with education, humor and assessments modeled after classic phishing expeditions to test staff members’...