Desperately seeking STEM: Ministry works to promote cyber-education

Source: National Cyber Security – Produced By Gregory Evans

In  a bid to ensure that Israel retains its edge in cyber-security, the the Science and Technology Ministry on Wednesday signed a deal with Lockheed Martin to produce educational curricula in science and technology, with an emphasis on teaching the principles of cyber-security. The objective is to create a new generation of tech experts who will ensure that Israel remains a leader in technology development – especially in cyber-security. There are currently more than 300 cyber-security start-ups in Israel, and those companies, along with veteran security firms like CheckPoint, attracted 10% of all cyber-security investments worldwide, government statistics show. “Studies show that there is a major gap in technology and science education between children from different economic backgrounds,” said Science and Technology Minister Danny Danon at the signing of the agreement with Patrick Dewar, executive vice-president of LM. “These gaps begin to develop at the kindergarten level. Ensuring that all children have an opportunity to learn science and technology is essential to the future of Israel,” said Danon. Danon had good reason to work out a cyber-education deal with LM, because that company has already amassed a great deal of experience in educating Israeli kids on STEM – science, technology, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Desperately seeking STEM: Ministry works to promote cyber-education appeared first on National Cyber Security.

View full post on National Cyber Security

Cyber-extortionists are liars

Source: National Cyber Security – Produced By Gregory Evans

The good news about cyber criminals who go in for extortion is that they also tend to be liars. The bad news — they’re extremely difficult to catch. Wade Woolwine, manager of strategic services at Rapid7, has dealt with his share of blackmailers who steal sensitive data from enterprises and then hold it for ransom. Companies call in Rapid7 to help them figure out whether the blackmailers do, in fact, have the data they claim to have, to learn how they got into the system and to get them out, and to figure out how to deal with the blackmail itself. Woolwine said that he’s worked on under a hundred of these cases. About a quarter of the time, the customer caves in and pays the ransom, typically between $10,000 and $25,000. In return, the blackmailers promise to delete the data they stole. Of course, there’s no guarantee that the blackmailers will actually do that. “There’s the rub,” Woolwine said. “They may not delete it. That’s why the advice we give to customers is to not deal with attackers. Reach out to law enforcement and reach out to an incident response firm.” Wade Woolwine, manager of strategic services at Rapid7 […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cyber-extortionists are liars appeared first on National Cyber Security.

View full post on National Cyber Security

Expert: People Need to Know their Data is Private

Source: National Cyber Security – Produced By Gregory Evans

Most people do not realize how much their data is being used for purposes they do not understand, internationally renowned security technologist Bruce Schneier told Arutz Sheva on the sidelines of the fifth annual International Cybersecurity Conference in Tel Aviv. “Largely, I think surveillance is bad,” Schneier said, adding that surveillance is leading to a world where people are losing their abilities to speak their mind without their thoughts being recorded, “and that’s very dangerous. I’m not convinced we really understand the implications”. At the same time, Schneier said, it is difficult to give up their cellphones or e-mail addresses because these are the “tools of modern life”. “What I want to see is more agitation for strong privacy laws,” he added. “People really need the ability to know their data is private.” Source: Israel National News

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Expert: People Need to Know their Data is Private appeared first on National Cyber Security.

View full post on National Cyber Security

Nude Photos of Hundreds of Aussie Women Shared Online Without Consent

Source: National Cyber Security – Produced By Gregory Evans

Images of over 700 women from Brisbane and nearby areas, either scantily-clad or in the nude, have been shared online without owners’ consent by an individual who hosted the cache in a cloud storage service. The hacker made multiple attempts to keep the data online and first published them on Friday on a forum. On Monday morning, the photos were taken down but reappeared by the evening. Hacker is determined to share the photos For easy distribution, the cache was uploaded to a file sharing service whose name remains undisclosed. Brisbane Times reports that the business is based in New Zealand, which should make it easy to identify it. The police intervened on Tuesday to take the photos down a second time, but it looks like the individual is adamant on sharing them, promising that they would end up on websites on the Deep Web, a part of the Internet designed generally for anonymity, that is not indexed by search engines and it is not accessible via regular web browsers. Although the Deep Web was created with honorable intentions (protecting privacy of the users like political activists or journalists), it also functions as an online dark alley where illegal businesses […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Nude Photos of Hundreds of Aussie Women Shared Online Without Consent appeared first on National Cyber Security.

View full post on National Cyber Security

DUTCH ETHICAL HACKING PLATFORM PULLS $25 MILLION INVESTMENT

Source: National Cyber Security – Produced By Gregory Evans

Dutch ethical hacking platform HackerOne has received a 25 million dollar – about 22,4 million euros – investment from New Enterprise Associates, VentureBeats reports.  This money will be used to employ more hackers to find flaws in companies’ digital security systems and notify them about the problems. Companies can then fix the problems before attackers have a chance to exploit them. “The HackerOne approach has the opportunity to fundamentally change the way we protect customers while rewarding the brilliant hacker community”, HackerOne CEO Merijn Terheggen told VentureBeat. “Companies can no longer afford to tackle security issues in isolation. Engaging the hacker community is an incredibly effective way to find security holes first. Organizations globally are starting to embrace this approach.” Some of HackerOne’s client base includes major tech companies Twitter, Dropbox, Yahoo, Adobe, LinkedIn, Airbnb, Vimeo and Snapchat. The platform currently employs 50 people and have helped find nearly 10 thousand security holes across its clients. Source: NL Times

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post DUTCH ETHICAL HACKING PLATFORM PULLS $25 MILLION INVESTMENT appeared first on National Cyber Security.

View full post on National Cyber Security

A ‘Tech Dad’ Emailed 97,931 People Their Hacked Passwords

Source: National Cyber Security – Produced By Gregory Evans

New hacker horror stories are being spun all the time, whether it’s Uber accounts being sold on the dark web, or an Anonymous affiliate posting the emails and passwords of Canadian government officials. Have you ever wondered if your email and password are floating around out there in cyberspace as part of a hacker’s massive data dump? Thankfully, a blogger known as “A Tech Dad”—his pen name is “Julian”—will tell you, whether you want to know or not. After hackers succeed in breaching a victim’s security, it’s common for them to post information like passwords, emails, documents, and messages to PasteBin—a site that lets users anonymously post messages in plain text. If your email and password were ever compromised, there’s a good chance that they’ll be in a PasteBin entry. But who spends their days trawling PasteBin, right? With this in mind, Julian decided to take matters into his own hands. He created a tool called Canary that scrapes PasteBin for password and email combos and then emails the people they belong to, letting them know they got hacked. Canary is affiliated with another site calledUrhack, which posts screenshots of hacked sites. There are a few services out there that […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post A ‘Tech Dad’ Emailed 97,931 People Their Hacked Passwords appeared first on National Cyber Security.

View full post on National Cyber Security

OPM wants $37M more for IT — U.S. cyber warriors fare OK in war game

Source: National Cyber Security – Produced By Gregory Evans

OPM WANTS $37M MORE FOR IT — The Office of Personnel Management told congressional appropriators it could use another $37 million to migrate its IT systems in the fiscal year starting in October, Dave scoops. The request came in an email sent last Friday, which was a response to congressional inquiries, OPM’s spokesman said. But any formal request for more money in the fiscal year 2016 OPM budget proposal would have to come from the Office of Management and Budget, and no such supplemental request has been sent in, according to a Senate Appropriations aide. More, from Dave: http://politico.pro/1Hwoho1 U.S. CYBER WARRIORS FARE OK IN WAR GAME — Cyber Command put its troops to the test recently, and generally they did pretty well, the Defense Department said in a rare press call Wednesday. Unlike a “capture the flag”-style competition, the opposing, red team wasn’t aiming to win, but rather “to train the blue team participants,” said Rear Adm. Kevin Lunday, director of exercises and training at U.S. Cyber Command. “They do that by placing them under extreme stress and pressure. … That’s where learning occurs — near the point of failure.” As a result, the red teams raise and lower […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post OPM wants $37M more for IT — U.S. cyber warriors fare OK in war game appeared first on National Cyber Security.

View full post on National Cyber Security

Anonymous cyber hackers hit UAE banking websites

Source: National Cyber Security – Produced By Gregory Evans

Several UAE banks were hit by a co-ordinated cyber attack, known in the trade as a distributed-denial-of-service (DDoS) attack, on Tuesday, crippling e-banking operations and websites, and leaving the unnamed institutions fearing further assaults, Arabian Business’ sister website ITP.net has reported. German systems integrator Help AG, which played a central role in the clean-up for one of the victims, told the website that the DDoS attack, which has been linked to cyber group Anonymous, happened on the last day of the month as the attackers sought to wreak maximum disruption during the banks’ busiest period. Help AG cited “sources in the market” who report “widespread” incidents in the UAE financial sector. A DDoS attack uses tens, sometimes hundreds, of thousands of computers to synchronise a bombardment of packet-traffic on a server. In the absence of sophisticated mitigation solutions, servers can be brought down and services brought to a halt. “Picking the last day of a month is a very wise choice from the attackers, as it is a widely known fact that the last three days of a calendar month are the busiest ones in the financial industry, as a lot of money is changing hands in the form of salaries, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Anonymous cyber hackers hit UAE banking websites appeared first on National Cyber Security.

View full post on National Cyber Security

Countering Cyber Attacks With Big Data And Analytics

Source: National Cyber Security – Produced By Gregory Evans

Executive Summary Organizations are challenged today as never before to protect their information assets, as well as the underlying networks and services that gather, store, process, and transmit this information. The same better, faster, cheaper information and communication technologies (ICT) that promise to make organizations more successful also present new means, motive, and opportunity to those who would steal information and use it for their own purposes. The most malicious actors are laser-focused on expanding and monetizing their hacking exploits; while legitimate organizations need to balance their security concerns among their other important objectives. Most organizations deal with attacks, for the most part successfully, on a number of fronts. For example, they manage end user access to applications and data stores, with authentication and authorization controls. Networks are secured by virtue of tunneling and encryption protocols, and through the use of firewalls, gateways and intrusion detection systems. Many large enterprises also have built, or contracted with service providers to operate, 24/7 security operations centers (SOCs), equipped with security information and event management systems (SIEMS), and manned by trained personnel. Unfortunately, current security solutions are simply not sufficient to protect organizations, especially from cyber-attacks based on advanced persistent threats (APTs). These […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Countering Cyber Attacks With Big Data And Analytics appeared first on National Cyber Security.

View full post on National Cyber Security

Prime Minister Flags Cyber-Security Concerns, Says India Can Play Big Role

Source: National Cyber Security – Produced By Gregory Evans

Flagging the threat to cyber-security globally, Prime Minister Narendra Modi on Wednesday said India can play a lead role in dealing with this “bloodless war” as he launched a digital initiative to which the corporate world pledged over Rs. 4,50,000 crores. He pitched for a digital revolution in the country and exhorted the industry to boost domestic production of electronic devices, which account for second largest imports, under the ‘Make in India‘ programme. Inaugurating ‘Digital India Week’ in New Delhi, he said digitalisation of all government work is essential to deal with problems like corruption, help provide transparent and efficient governance and bridge the rich-poor divide. Highlighting the country’s potential in IT sector, Modi called upon the Indian youth to innovate and go for “Design in India”. He promised government support to ‘startups’ and said India has the potential of becoming the second country after the USA in this area. “We have to move from e-governance to m-governance. M-governance does not mean Modi governance. It means mobile governance,” he said at a function in New Delhi which was attended by several ministers, top Indian industrialists and CEOs of some global companies besides a few BJP leaders like L K Advani […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Prime Minister Flags Cyber-Security Concerns, Says India Can Play Big Role appeared first on National Cyber Security.

View full post on National Cyber Security

Page 20 of 2,395« First...10«1819202122»304050...Last »

My Twitter

Gregory D. Evans On Facebook