Source: National Cyber Security – Produced By Gregory Evans Social media is a conduit for thieves to get personal data (they can use it, for instance, to open up a credit line in the victim’s name). Though many people are concerned their personal information will get in the wrong hands,…
Spam email down below 50%, 1st time in a decade
Source: National Cyber Security – Produced By Gregory Evans The level of spam has fallen to less than 50 per cent of the total volume of email, for the first time in more than a decade, according to security firm Symantec. The last time Symantec recorded a similar spam rate…
CVS Shuts Down Its Photo Site After Suspected Hacker Break-In
Source: National Cyber Security – Produced By Gregory Evans CVS has shut down its online photo service, warning its customers that there may have been a data theft and to call their banks if they get suspicious credit card charges. The drugstore alerted people with a warning on its CVSPhoto.com…
Get A Lifetime Of Hacker Protection From VPN Land for 74% Off
Source: National Cyber Security – Produced By Gregory Evans There’s no time like the present to start protecting your data from hackers and nosy advertisers. VPN Land is a private piece of Internet where you can browse freely and securely while utilizing over 400 reliable servers. Use VPN Land’s speedy…
School IT systems struggle with cyber security
Source: National Cyber Security – Produced By Gregory Evans Dive Brief: This spring, a student launched a cyber attack on Idaho’s largest school district, slowing the Internet connection and caused computers to crash. Few school districts have the security systems necessary to ward off similar attacks while they’re in progress, and, in…
UCLA Health system targeted by cyber attackers
Source: National Cyber Security – Produced By Gregory Evans As many as 4.5 million patient files may have been breached by a cyber attack on the UCLA Health system, but there is no evidence yet that any personal or medical information has been accessed, officials said Friday. The attack may…
Are There Differences Between Threat Intelligence Feeds?
Source: National Cyber Security – Produced By Gregory Evans While cyber threat intelligence hype is at an all-time high across the industry, many enterprise organizations are actually building internal programs and processes for threat intelligence consumption, analysis, and operationalization. This trend will likely continue. According to ESG research, 27% of…
The Security of Things: IoT and cybercrime
Source: National Cyber Security – Produced By Gregory Evans The Internet of Things (IoT) is heralded as the next disruptive technology to transform the economy, business and consumer lifestyles alike. However, as cybercrime becomes a national issue, IoT presents the biggest opportunities yet for sophisticated hackers to capitilise on vulnerabilities…
Here’s a closer look at the upcoming Sony Xperia Z5 and Z5 Compact
A couple of days ago, we got quite a good look at what was claimed to be the Sony Xperia Z5 and Z5 Compact. As well as offering a glimpse of the archetypal Xperia form factor, we also caught a glimpse of the fingerprint sensor that Sony looks set to…
At Norwich University, Summer Campers Solve Crimes In Cyberspace
Source: National Cyber Security – Produced By Gregory Evans About 20 high school students have been spending this week at Norwich University solving fictional crimes in cyberspace. They’re attending a free summer camp funded by the National Science Foundation and the National Security Agency. The NSA calls these sleuthing sessions…