Source: National Cyber Security – Produced By Gregory Evans ISIS social media accounts are buzzing with a spreadsheet of personal data on employees of the American, British, and Australian governments, including military personnel. The Islamic State claims this list was compiled using data stolen from government systems by its “hacking…
Deutsche Telekom Calls Smartphones Weak Spot for Hacking
Source: National Cyber Security – Produced By Gregory Evans Smartphones and tablet devices are the new weak spot in the battle against cyber-criminals, according to the head of computer security at Europe’s biggest phone company. Businesses and governments have already been struggling with a record number of so-called distributed denial…
Bodyguard Training with AK 47, Shooting strong and weak side
REAL Combat Shooting, Dr.Andre Glenn. Read More…. View full post on Hip Hop Security
Afghan Islamic Press website hacked, weak passwords exposed by @VenomSec
The cyber attacks in the middle east have taken a turn to another country which has not seen to many attacks in the past. That country is Afghanistan and the hackers who are carrying out these attacks are known as @VenomSec. The most recent attack is on a afghan Islamic press (http://afghanislamicpress.com/) website and has resulted…
LulzSec MilitarySingles data breach caused by weak security
The major LulzSec data raid on the MilitarySingles.com dating site in March was caused by a catalogue of security problems including poor web application design and the use of weak encryption, an analysis from Imperva has claimed. View full post on Techworld.com security View full post on National Cyber Security
Survey Finds Energy and Utility Industry Companies Weak on Cyber Risk Management (May 16, 2012)
A recent survey of 108 global companies conducted by the Carnegie Mellon University CyLab and sponsored by RSA and Forbes found that those in the financial sector have the best cyber and information risk management … View full post on National Cyber Security
Android in enterprises ‘severely limited’ by weak management support from Google
Adoption of Android tablets and smartphones in large businesses has been “severely limited” because of the complexities of managing the various Android models and versions, market research firm Gartner said in an evaluation of 20 … View full post on National Cyber Security » Announcements
Weak economy, lack of opportunities have returning vets fighting for jobs
How many soldiers will be coming to Western Pennsylvania, and for what kind of work? What are the barriers they face? View full post on cyber wars – Yahoo! News Search Results View full post on National Cyber Security
Official says weak security hampers cyber efforts
International cooperation on developing better tools and methods to prevent cyberattacks is being undermined by poor computer security among U.S. allies, a senior Pentagon official said Tuesday. View full post on Security News Headlines – Yahoo! News View full post on National Cyber Security
Researchers find many weak Stratfor passwords
A professor at Utah Valley University analyzed the leaked password hashes stolen by Anonymous from security firm Stratfor and determined even their security minded customers choose weak passwords. View full post on Naked Security – Sophos View full post on National Cyber Security