IoT, APIs, and Criminal Bots Pose Evolving Dangers

Posted on March 1st, 2019 by Responsible Cyber

A pair of reports reach similar conclusions about some of the threats growing in cyberspace and the industries likely to be most affected. A pair of research reports released today paint a picture of a cyberthreat landscape that is continuing to evolve in ways both expected and not. The reports, released by Netscout and Akamai, […]

Read More

Turkish Group Using Phishing Emails to Hijack Popular Instagram Profiles

Posted on March 1st, 2019 by Responsible Cyber

In some cases, attackers have demanded ransom, nude photos/videos of victims in exchange for stolen account, Trend Micro says. A group of Turkish-speaking hackers is hijacking popular Instagram profiles, including those belonging to actors and singers, and, in some cases, promising to turn back control to the victims in exchange for a ransom or nude photos […]

Read More

6 Tax Season Tips for Security Pros

Posted on February 20th, 2019 by Responsible Cyber

Here are some practical ways to keep your company safe as Uncle Sam comes calling. 1 of 7 (Image: Artur � Adobe Stock) The tax season has arrived, which means security pros should be on the lookout for tax-related phishing and vishing scams. According to the IRS, last year saw a 60% increase in bogus […]

Read More

Prep for The Next Cybersecurity Arms Race at Black Hat Asia

Posted on February 20th, 2019 by Responsible Cyber

Don’t miss out on some of the world-class Briefings and Trainings on offer for cybersecurity professionals concerned about the most pressing threats of 2019. As you get ready for Black Hat Asia in Singapore next month, organizers want to ensure you don’t miss out on some of the Briefings and Trainings for cybersecurity professionals concerned […]

Read More

High Stress Levels Impacting CISOs Physically, Mentally

Posted on February 15th, 2019 by Responsible Cyber

Some have even turned to alcohol and medication as their demands outpace resources. A quarter of chief information security officers (CISOs) suffer from mental and health disorders as a result of tremendous and growing work pressures, a new survey shows. Contributing to the strain are concerns about job security, inadequate budget and resources, and a […]

Read More

How polls are hacked: What every business should know

Posted on February 14th, 2019 by Responsible Cyber

The news in January about Michael Cohen’s indictments covers some interesting ground for IT managers and gives security teams something else to worry about: He allegedly paid a big data firm Redfinch Solutions to rig two online polls in then-candidate Donald Trump’s favor. To those of us who have worked with online polls and surveys, […]

Read More

Snapd Flaw Lets Attackers Gain Root Access On Linux Systems

Posted on February 14th, 2019 by Responsible Cyber

Ubuntu and some other Linux distributions suffer from a severe privilege escalation vulnerability that could allow a local attacker or a malicious program to obtain root privileges and total control over the targeted system.Dubbed “Dirty_Sock” and identified as CVE-2019-7304, the vulnerability was discovered by security researcher Chris Moberly, who privately disclosed it to Canonical, the […]

Read More

Disastrous cyber attack on email provider wipes US servers and backups

Posted on February 13th, 2019 by Responsible Cyber

Some cyber attacks are so disastrous that there’s no coming back from them. Email provider VFEmail worried that was the case when it said a hacker caused “catastrophic destruction” on Monday by destroying all data on U.S. servers, as well as the backup systems. On Monday morning, after VFEmail’s site, servers, and webmail client went […]

Read More

China’s AI Strategy and its Security Implications

Posted on February 13th, 2019 by Responsible Cyber

Gregory C. Allen at the Center for a New American Security has a new report with some interesting analysis and insights into China’s AI strategy, commercial, government, and military. There are numerous security — and national security — implications. Tags: artificial intelligence, China, national security policy, reports Go to Source Author: Bruce Schneier

Read More