ProtectMyID: Encrypt or password protect all sensitive data stored on computers and allow access only on a “need to know basis” #identitytheft View full post on Twitter / ProtectMyID View full post on National Cyber Security Gregory Evans | LinkedIn Interview With Gregory Evans Gregory Evans Security Expert Gregory Evans…
Hackers harvest Facebook private data with social bots
Facebook’s fake account detection mechanisms can be defeated 80 percent of the time with the help of automated tools, researchers from the University of British Columbia have found after an eight week test. The research team, composed of Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov and Matei Ripeanu, created a network…
New Mac Malware Part Trojan, Data Stealer, Spyware, BitCoin Miner
Security researchers have uncovered yet another Mac Trojan in the wild, this time hiding inside pirated versions of the Mac OS X image editing application GraphicConverter. The pirated copy of GraphicConverter 7.4 is being actively distributed on file-sharing networks and torrent sites like Pirate Bay and contains the DevilRobber Trojan,…
#Ebook Deal/Day: Privacy and Big Data – $8.49 (Save 50%)
Get “Privacy and Big Data” today and save 50%! This sale ends at 2:00 AM 2011-10-31 (PDT, GMT-8:00). View full post on O’Reilly News and Commentary View full post on National Cyber Security
Facebook confirms first data center outside US on edge of Arctic Circle
STOCKHOLM — Facebook is to build a new server farm on the edge of the Arctic Circle — its first outside the United States — to improve performance for European users, officials of the social networking site said Thursday. It will also expose them to potential eavesdropping from a Swedish…
Duqu, Son Of Stuxnet, Wants Your Data
October 27, 2011: There is another Stuxnet out there, called Duqu, and its preparing for an even broader attack on industrial targets. Stuxnet, a computer worm (a computer program that constantly tries to copy itself to other computers) showed up two years ago. View full post on computer worm –…
Top secret defence data stolen from Japanese contractor
Attackers did after all steal plans for fighter jets and nuclear power plant safety systems during August’s hack of Japanese defence contractor Mitsubish Heavy, sources in the country have claimed. The unsourced revelation in the Japanese press adds more detail to what has always looked like a serious attack on…
US police data officer leaked by angry hackers
Hacktivists have disrupted dozens of US police websites and leaked the personal details of up to 2,000 officers, apparently in protest at the treatment meted out to supporters of the ‘Occupy’ protest movement. In a message posted to Pastebin on Friday, a group claiming to represent Anonymous said it had…
DOJ Used Secret Court Order to Obtain Data in WikiLeaks Investigation (October 10, 2011)
The US Justice Department’s (DOJ) obtained secret court orders to gain to information about the accounts of former WikiLeaks spokesman Jacob Appelbaum from Google and Internet service provider (ISP) Sonic……. View full post on SANS NewsBites View full post on National Cyber Security
Enterprise security spending up, but data protection overlooked
It’s no big secret. Contemporary attacks are levied over the web, attackers will craft custom malware to slither past anti-malware defences and any business on any given day can be compromised. That’s the reality of where information security stands today. Clearly, enterprises are aware of this as investments in many…