Combatant commands vulnerable to cyber attacks

Source: National Cyber Security – Produced By Gregory Evans Cyber red teams are still able to gain the upper hand in major training exercises, and combatant command missions “remain at risk when subjected to cyber-attacks emulating an advanced nation-state adversary,” according to a Department of Defense report. The Office ……

read more

911 is Vulnerable to DDoS Attacks: Hackers Prove How Easy it is!

Source: National Cyber Security – Produced By Gregory Evans America’s people centric and globally popular emergency helpline number 911 has been found to be easily vulnerable to Distributed Denial of Service or DDoS attacks. Mordechai Guri, Yisroel Mirsky, Yuval Elovici, researchers at the Cyber Security Research Centre of Ben The…

read more

Four Ways to Protect Vulnerable Students Under ESSA – Education Week

The language of the Every Students Succeeds Act could shortchange students in Title 1 schools, writes Teach Plus executive vice president Alice Johnson Cain. View full post on Education Week: Bullying #pso #htcs #b4inc Read More The post Four Ways to Protect Vulnerable Students Under ESSA – Education Week appeared…

read more

B.C. government systems vulnerable to hacking: Auditor General

Source: National Cyber Security – Produced By Gregory Evans Many British Columbia government organizations lack a strong enough line of defence against hacking, system threats and disruption, according to the province’s auditor general. Carol Bellringer released a new report Tuesday examining general computing controls, or the policies and practices that…

read more

BBB: Children are vulnerable to identity theft as well

Source: National Cyber Security – Produced By Gregory Evans As an adult, discovering that your identity has been compromised is a scary occurrence. Once identity thieves have your personal information, they can drain your bank account, run up charges on your credit cards and even file a tax refund in…

read more

Flickr vulnerable to SQL Injection and Remote Code Execution Flaws

Source: National Cyber Security – Produced By Gregory Evans Flickr, one of the biggest online photo management and sharing website in the world was recently impacted by critical web application vulnerabilities, which left website’s database and server vulnerable hackers.Ibrahim Raafat, a security researcher from Egypt has found SQL injection vulnerabilities…

read more