Archive for the ‘cybersecurity’ Category

How to Secure Your Mid-Size Organization From the Next Cyber Attack

January 15th, 2019
If you are responsible for the cybersecurity of a medium-sized company, you may assume your organization is too small to be targeted. Well, think again. While the major headlines tend to focus on large enterprises getting breached – such as Sony, Equifax, or Target the actual reality is that small and mid-sized companies are experiencing similar threats. According to Verizon’s 2018 Data

Posted in Cyber Attack, cyber security, cyber security videos, cyber security webinar, cybersecurity, Enterprise Security, hacking news, webinar | Comments (0)

Australia Passes Anti-Encryption Bill—Here’s Everything You Need To Know

December 7th, 2018
Australia's House of Representatives has finally passed the "Telecommunications Assistance and Access Bill 2018," also known as the Anti-Encryption Bill, on Thursday that would now allow law enforcement to force Google, Facebook, WhatsApp, Signal, and other tech giants to help them access encrypted communications. The Australian government argues the new legislation is important for national

Posted in anti-encryption bill, australia, crack encryption, cybersecurity, encryption, end-to-end encryption, Government, law enforcement, national security, online encryption | Comments (0)

Uber fined $1.1 million by UK and Dutch regulators over 2016 data breach

November 27th, 2018
British and Dutch data protection regulators Tuesday hit the ride-sharing company Uber with a total fine of $1,170,892 (~ 1.1 million) for failing to protect its customers’ personal information during a 2016 cyber attack involving millions of users. Late last year, Uber unveiled that the company had suffered a massive data breach in October 2016, exposing names, email addresses and phone

Posted in cybersecurity, data breach, data breach fine, hacking news, personal data, Uber, Uber app | Comments (0)

8 Popular Android Apps Caught Up In Million-Dollar Ad Fraud Scheme

November 27th, 2018
Cheetah Mobile—a prominent Chinese app company, known for its popular utility apps like Clean Master and Battery Doctor—and one of its subsidiary Kika Tech have allegedly been caught up in an Android ad fraud scheme that stole millions of dollars from advertisers. According to app analytics firm Kochava, 7 Android apps developed by Cheetah Mobile and 1 from Kika Tech with a total 2 billion

Posted in ad fraud, android adware, android app developer, Android Malware, Cheetah Mobile, Clean Master, CM File Manager, CM Launcher, cybersecurity | Comments (0)

Why you need to know about Penetration Testing and Compliance Audits?

November 15th, 2018
We live in an age where data flows like water, becoming the new life source of our everyday ventures. As such, you can just imagine what all of that entails and the weight that data receive, especially when it comes to a decision making on how to handle this fairly new and arguably invaluable resource. Of course, we are well aware from a very young age that our water needs to be pure, filtered

Posted in Compliance Audit, Compliance Audits, cyber security policy, cyber security software, cybersecurity, Penetration Testing, Penetration testing tools, vulnerability assessment | Comments (0)

0-Days Found in iPhone X, Samsung Galaxy S9, Xiaomi Mi6 Phones

November 15th, 2018
At Pwn2Own 2018 mobile hacking competition held in Tokyo on November 13-14, white hat hackers once again demonstrated that even the fully patched smartphones running the latest version of software from popular smartphone manufacturers can be hacked. Three major flagship smartphones—iPhone X, Samsung Galaxy S9, and Xiaomi Mi6—were among the devices that successfully got hacked at the annual

Posted in cybersecurity, hacking competition, hacking news, iPhone X, mobile hacking, Samsung Galaxy S9, smartphone hacking, Vulnerability, Xiaomi Mi 6, Zero-Day Vulnerability | Comments (0)

Cynet Review: Simplify Security with a True Security Platform

November 13th, 2018
In 1999, Bruce Schneier wrote, "Complexity is the worst enemy of security." That was 19 years ago (!) and since then, cyber security has only become more complex. Today, controls dramatically outnumber staff available to support them. The Bank of America has a $400-million cyber budget to hire security staff and implement a broad array of products. But what if your budget and

Posted in cyber security, cyber security policy, cyber security software, cyber security tools, cybersecurity, cybersecurity framework, Cynet, incident response tool, network security auditor, network security tool | Comments (0)

Top 5 Factors That Increase Cyber Security Salary The Most

November 12th, 2018
Our partner Springboard, which provides online courses to help you advance your cybersecurity career with personalized mentorship from industry experts, recently researched current cybersecurity salaries and future earning potential in order to trace a path to how much money you can make. Here's what they found were the most important factors for making sure you earn as much as possible: 1

Posted in cyber security, cyber security career, Cyber Security Certifications, cyber security degree, cyber security jobs salary, cyber security training, cybersecurity, cybersecurity jobs, cybersecurity salary | Comments (0)

Here’s How Hackers Could Have Spied On Your DJI Drone Account

November 8th, 2018
Cybersecurity researchers at Check Point today revealed details of a potential dangerous vulnerability in DJI Drone web app that could have allowed attackers access user accounts and synced sensitive information within it, including flight records, location, live video camera feed, and photos taken during a flight. Thought the vulnerability was discovered and responsibly reported by the

Posted in cybersecurity, DJI Drone, DJI Mavic Pro Drone, DJI Phantom Drone, hacking news, Vulnerability | Comments (0)