cybersecurity   7280

« earlier    

Equifax breach is a reminder of society's larger cybersecurity problems
The modern world depends on critical systems, networks and data repositories that are not as secure as they should be. Breaches will continue until society as a whole makes some big changes.
cybersecurity  privacy  training  bad  companies  incentives 
yesterday by mifepba
Data breaches are inevitable – here's how to protect yourself anyway
Think defensively about your online accounts and data security – and don't assume you'll avoid harm.
cybersecurity  privacy  big  data  protect  yourself 
yesterday by mifepba
Using Cybersecurity as an MSP Sales Tool
Using Cybersecurity as an MSP Sales Tool I write a guest article (the first of 2019!) for…
Richard.Tubb  Auvik  Guest.Blog  CyberSecurity 
2 days ago by tubblog
Yes, you can remotely hack factory, building site cranes. Wait, what? • The Register
"Did you know that the manufacturing and construction industries use radio-frequency remote controllers to operate cranes, drilling rigs, and other heavy machinery? Doesn't matter: they're alarmingly vulnerable to being hacked, according to Trend Micro."

"In addition to basic replay attacks, where commands broadcast by a legitimate operator are recorded by an attacker and rebroadcast in order to take over a targeted plant, attack vectors also included command injection, "e-stop abuse" (where miscreants can induce a denial-of-service condition by continually broadcasting emergency stop commands) and even malicious reprogramming. During detailed testing of one controller/receiver pair, Trend Micro researchers found that forged e-stop commands drowned out legitimate operator commands to the target device."

"Just to keep site managers' blood pressure high, Trend Micro highlighted that not only could script kiddies carry out some of these types of attack against industrial plants, a remote attacker could achieve persistent access by using a battery-powered cellular modem dropped off at a quiet part of a site with a drone."
TheRegister  hacking  cyber-spectrum  vulnerability  cybersecurity 
3 days ago by pierredv
Twitter
When you play games with your and you're a game company, this happens. Nice find by !…
cybersecurity  from twitter
3 days ago by phoneboy
Twitter
A2:We are clearly going through a transitional phase of past attitudes of . Because of these less sec…
CyberSecurity  from twitter_favs
3 days ago by mgifford
The Route of a Text Message – the scottbot irregular
"This is the third post in my full-stack dev (f-s d) series on the secret life of data. This installment is about a single text message: how it was typed, stored, sent, received, and displayed. I sprinkle in some history and context to break up the alphabet soup of protocols, but though the piece gets technical, it should all be easily understood."
code  infrastructure  security  cybersecurity  history  SS7 
3 days ago by pierredv
NHS Trusts Spending Zero On Cybersecurity Training
The NHS has not learned its lesson following WannaCry, with an FOI investigation showing that many trusts are not investing in their cybersecurity training and are not hitting IG targets.
nhs  cyber  cybersecurity  training 
4 days ago by mysty
Twitter
I have been appointed rapporteur for the Competence Centre, and I propose we seize the…
Cybersecurity  from twitter_favs
4 days ago by sfermigier
Opinion | Our Cellphones Aren’t Safe - The New York Times
Security flaws threaten our privacy and bank accounts. So why aren’t we fixing them?
cybersecurity  mobile  mobile-privacy  surveillance 
4 days ago by javierruiz

« earlier    

related tags

201  2018  2019  4g  5g  ability  affecting  ai  analytics  andrewtsonchev  apt  apt10  asia  assessment-vs-analysis  atlanta  attack  autocracy  auvik  bad  big  bitcoin  blackout  browser  bruceschneier  bugbounty  businessinsider  cellphones  cellular  census  centurylink  ces2019  china  cis3360  cis4615  clear  clients  cmos  code  companies  company  computers  consumer  could  crime  cyber-spectrum  cyber  cyberattacks  cybercrime  cyberprivacy  cyberwar  cyberx  damage  dan-massey  darktraceindustrial  darkweb  data  data_ethics  data_governance  databreach  dataprivacy  december  democracy  denverpost  desalination  designthinking  dhs  dibnet  digital_ethics  digitalmarketing  dirk-grunwald  dni  dod  dyndns  edtech  education  eff  equifax  exploit  extortion  facebook  factories  fail  fast  flintcapital  gatwickairport  github  government's  government  govtech  guest.blog  gui  hack  hacker  hackers  hacking  hacks  hardware  hire  history  http  https  hundreds  identity.theft  incentives  infosec  infrastructure  innovation  insurance  internet  internetofthings  investment  iot  iran  israel  it-risk-management  javascript  jimedwards  js  kernel  law  linux  longread  malware  marriott  mauritania  metaresearch  microsoft  mitm  mobile-privacy  mobile  netsec  networks  news  nhs  nilgiller  nistcsf  northkorea  nsa  ntlm2  o365  of  office365  orms  osint  otf  outages  passport  pdf  pentagon  playbooks  policy  politics  predix2019  privacy  protect  python  reference  regulator  report  richard.tubb  risk-analysis  risk-assessment  risks  robo  rootkit  russia  sandiego  scrm  security  sergeygribov  server  sharing  shutdown  siemens  sierraleone  sigma  soc  social_fabric  socialmedia  southeastasia  spoofing  spy  ss7  ssl  stego  step7  still  stuxnet  supplychain  surveillance  syscall  talent  tech  technologies  technology  the  theregister  threathunting  thursdaythoughts  tls  to  toolkit  tools  top  training  trainings  travel  ukraine  uno  usa  uscert  useful  utilities  via-diigo  via-ifttt  via-pocket  vietnam  vulnerability  wannacry  washingtonpost  water  wifi  windows  women  worm  wpa3  yourself 

Copy this bookmark:



description:


tags: