Source: National Cyber Security – Produced By Gregory Evans 2015 has been a challenging year as insider threats and malware as well as stealthy and evolving attacks affected enterprises. Taking stock, IBM Security has identified the top four cyber-threat trends of the year: amateur hacker carelessness, ransomware, insider threats and…
Man Sentenced for Making Threats Against Churchville-Chili School District
A Brighton man who admitted to making threats against the Churchville-Chili school district was sentenced Wednesday. Joseph Lamica called the Churchville-Chili school district March 12 and threatened to “slit throats.” Monroe County Sheriff’s deputies said Lamica also called and threatened the Rush-Henrietta school district on the same day. Federal prosecutors…
The biggest hacking threats for the future
Source: National Cyber Security – Produced By Gregory Evans QUESTION: What’s the biggest hacking threat you can see for the future? ANSWER: Most of the scariest “future” hacking threats are possible right now, from hacked cars and firearms to cloned NFC payment systems and SIM cards. Imagine your car going…
New world, new threats
Source: National Cyber Security – Produced By Gregory Evans Driven by rising costs in exploration and production, increasing competitive intensity and regulatory pressures, oil and gas companies are looking for new ways to increase production capacity and improve operational efficiencies. This has led to the rapid adoption of digital technologies…
Are cyber threats the Achilles’ heel of the smart home?
Source: National Cyber Security – Produced By Gregory Evans The advent of smart home technology has forever changed the face of the residential alarm industry for the better. Not only are people more connected to their systems than ever before, but it has also breathed new life into the industry…
4 common but dangerous cyber threats and steps to address them
Source: National Cyber Security – Produced By Gregory Evans Increased access to the technical tools needed to launch cyber attacks, minimal risk of apprehension and lucrative payouts have created a perverse incentive for criminals to embrace crimes that are cyber-enabled or cyber-dependent. The nature of cyber crimes, the motivation behind…
Kudu Dynamics aims at cyber security threats
Source: National Cyber Security – Produced By Gregory Evans U.S. Air Force cyber security experts are looking to Kudu Dynamics LLC in Catharpin, Va., to help enhance the understanding of internal computer functions as a way to detect and counter advanced cyber warfare threats. Officials of the Air Force Research…
Local businesses protect others from cyber-security threats
Source: National Cyber Security – Produced By Gregory Evans It’s usually kidnapped people – not a hijacked computer – that are held for ransom. “Once that machine is encrypted by the malware, the hacker contacts you with a ransom note to your screen: ‘If you want the keys to encrypt…
Cyber threats relatively unknown outside IT, says expert
Source: National Cyber Security – Produced By Gregory Evans Few business people outside IT departments have any knowledge of current information security threats, according to BH Consulting founder and chief executive Brian Honan. “In many businesses, few non-IT people have heard of even big information security threats, such as the…
Bank CEOs worried cyber threats will affect business growth
Source: National Cyber Security – Produced By Gregory Evans Shortly after the biggest ever web heist, new research claims that CEOs from banks are concerned over how cyber risks can damage growth. PwC’s Achieving Success Without Managing Disruption study surveyed 175 banking and capital marketing CEOs, and found that 92…