tag:blogger.com,1999:blog-41893589767133595892024-03-14T03:17:11.236+12:00zQure | security news | zqure.comzqure, zqure.com, cybersecurity, security news,Unknownnoreply@blogger.comBlogger233125tag:blogger.com,1999:blog-4189358976713359589.post-48459197154673679312014-12-29T00:00:00.000+12:002014-12-29T00:00:03.661+12:00Cyber Security, Cyber Threat News<i>Cyber Security, Cyber Threat News via Twitter:</i><br />
<br />
<a class="twitter-timeline" data-widget-id="546830380289241090" href="https://twitter.com/search?q=cyber%20security%20OR%20cyber%20threat">Tweets about cyber security OR cyber threat</a>
<script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+"://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");</script>
<br />
<b><i><span style="font-size: large;"><br /></span></i></b>
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure">Follow @zqure</a><br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-91493495920334273472014-12-22T00:00:00.000+12:002016-10-02T17:40:57.949+12:00ICANN Security Awareness Resource LocatorICANN Security Awareness Resource Locator: <i>"All stakeholders should learn how to protect themselves, their families, or their organizations against online threats. The resources on this page can help consumers, business or IT professionals avoid online threats or harm and make informed choices regarding (personal) data disclosure or protection. The links on this list are external to ICANN's web site. ICANN has no influence over and is not responsible for changes to links or to content on these sites." </i><a href="https://www.icann.org/resources/pages/security-awareness-resource-2014-12-04-en" rel="nofollow" target="_blank">Resources - ICANN</a> --excerpts (go to foregoing link for full list):<br />
<br />
Child or Consumer Online Safety<br />
Get Safe Online<br />
<a href="https://www.getsafeonline.org/" rel="nofollow" target="_blank">https://www.getsafeonline.org/</a><br />
<br />
Stay Safe Online<br />
<a href="http://www.staysafeonline.org/" rel="nofollow" target="_blank">http://www.staysafeonline.org</a><br />
<br />
Stop. Think. Connect.<br />
<a href="http://stopthinkconnect.org/" rel="nofollow" target="_blank">http://stopthinkconnect.org</a><br />
<br />
Kid's Health<br />
<a href="http://kidshealth.org/parent/positive/family/net_safety.html" rel="nofollow" target="_blank">http://kidshealth.org/parent/positive/family/net_safety.html</a><br />
<br />
Malta's Be Smart Online!<br />
<a href="http://besmartonline.org.mt/" rel="nofollow" target="_blank">http://besmartonline.org.mt/</a><br />
<br />
Australia Stay Smart Online<br />
<a href="http://www.staysmartonline.gov.au/" rel="nofollow" target="_blank">http://www.staysmartonline.gov.au/</a><br />
<br />
A Parent's Guide to Internet Safety<br />
<a href="https://www.fbi.gov/resources/parents" rel="nofollow" target="_blank">https://www.fbi.gov/resources/parents</a><br />
Information aimed to help parents understand the threats of child exploitation or harm. Explains signs that may indicate that a child is at risk online and how to respond. Interpol's <a href="http://www.interpol.int/Crime-areas/Crimes-against-children/Crimes-against-children" rel="nofollow" target="_blank">Crimes Against Children</a> site and Europol's Child Sexual Exploitation <a href="https://www.europol.europa.eu/sites/default/files/publications/child-sexual-exploitation-factsheet-2010.pdf" rel="nofollow" target="_blank">fact sheet</a> provide complementary information.<br />
<div>
<br />
National Cyber Awareness System<br />
<a href="http://www.us-cert.gov/ncas/" rel="nofollow" target="_blank">http://www.us-cert.gov/ncas/</a><br />
The US CERT National security awareness system provides information about common security issues, <a href="http://www.us-cert.gov/ncas/tips/">tips</a> for non-technical computer users, and articles for <a href="http://www.us-cert.gov/home-and-business" rel="nofollow" target="_blank">home and business</a> users.</div>
<div>
<br />
Microsoft Family Safety Center<br />
<a href="http://www.microsoft.com/security/family-safety/default.aspx" rel="nofollow" target="_blank">http://www.microsoft.com/security/family-safety/default.aspx</a><br />
<br />
STH. End User Training<br />
<a href="http://www.securingthehuman.org/enduser/" rel="nofollow" target="_blank">http://www.securingthehuman.org/enduser/</a><br />
<br />
National Cyber Awareness System<br />
<a href="http://www.us-cert.gov/government-users/" rel="nofollow" target="_blank">http://www.us-cert.gov/government-users/</a><br />
The US CERT National security awareness system provides information about common security issues government users are likely to encounter, including <a href="https://ics-cert.us-cert.gov/Training-Available-Through-ICS-CERT" rel="nofollow" target="_blank">training</a> and <a href="https://ics-cert.us-cert.gov/Introduction-Recommended-Practices" rel="nofollow" target="_blank">best practices</a>.</div>
<div>
<br />
Stay Safe Online<br />
<a href="http://www.staysafeonline.org/business-safe-online/" rel="nofollow" target="_blank">http://www.staysafeonline.org/business-safe-online/</a><br />
The Keep My Business Safe section of this site includes tip sheets, security planning or training guides, and articles describing how to's (how to assess your risk, conduct security assessments, monitor threats, or report incidents).</div>
<div>
<br />
Information Warfare Site<br />
<a href="http://www.iwar.org.uk/" rel="nofollow" target="_blank">http://www.iwar.org.uk</a><br />
IWS offers a security awareness <a href="http://www.iwar.org.uk/comsec/resources/sa-tools/index.htm" rel="nofollow" target="_blank">toolbox</a> and very good <a href="http://www.iwar.org.uk/comsec/resources/sa-tools/Principles-of-Effective-Security-Awareness.pdf" rel="nofollow" target="_blank">paper</a> describing the key elements of a security awareness program.</div>
<div>
<br />
Cisco Systems Security Education Program<br />
<a href="http://www.cisco.com/web/about/security/cspo/awareness/index.html#~acc~panel-5" rel="nofollow" target="_blank">http://www.cisco.com/web/about/security/cspo/awareness/index.html#~acc~panel-5</a><br />
<br />
Microsoft Security Awareness Toolkit<br />
<a href="http://www.microsoft.com/en-us/download/details.aspx?id=11428" rel="nofollow" target="_blank">http://www.microsoft.com/en-us/download/details.aspx?id=11428</a><br />
<br />
Infragard Awareness Programs<br />
<a href="https://www.infragardawareness.com/" rel="nofollow" target="_blank">https://www.infragardawareness.com/</a><br />
<br />
National Institute of Health Information Security and Privacy Awareness Training<br />
<a href="http://irtsectraining.nih.gov/publicUser.aspx" rel="nofollow" target="_blank">http://irtsectraining.nih.gov/publicUser.aspx</a><br />
<br />
National Institute for Science and Technology<br />
<a href="http://csrc.nist.gov/" rel="nofollow" target="_blank">http://csrc.nist.gov</a><br />
<br />
<a href="http://csrc.nist.gov/publications/nistpubs/800-50/NIST-SP800-50.pdf" rel="nofollow" target="_blank">NIST 800-50: Security Awareness and Training Program</a> provides guidelines for government agency security awareness and training programs. <a href="http://csrc.nist.gov/publications/nistpubs/800-16/800-16.pdf" rel="nofollow" target="_blank">NIST 800-16: Information Technology Security Training Requirements is a comprehensive document that can be used for generally any organization's security awareness programs.</a></div>
<div>
<br />
ENISA Information Security Awareness Materials<br />
<a href="https://www.enisa.europa.eu/media/multimedia/material" rel="nofollow" target="_blank">https://www.enisa.europa.eu/media/multimedia/material</a><br />
ENISA has published a <a href="http://www.enisa.europa.eu/publications/archive/copy_of_new-users-guide" rel="nofollow" target="_blank">User's Guide, How to Raise Information Security Awareness</a>, and offers training videos, posters, screen savers, and illustrations (cartoons) in several EU languages (French, English, German, Spanish).</div>
<div>
<br />
CERT Moldova<br />
<a href="http://cert.gov.md/" rel="nofollow" target="_blank">http://cert.gov.md/</a> (in Romanian)<br />
<br />
CERT Moldova provides security awareness and best practices tips for a wide range of audiences.<br />
CERT Sri Lanka<br />
<a href="http://www.cert.ik/" rel="nofollow" target="_blank">http://www.cert.ik</a><br />
<br />
CERT Sri Lanka offers a knowledge base with information security policy domains, FAQs, general online safety tips, social media best practices and security tools.<br />
ICT GOZO Malta Cyber Awareness<br />
<a href="http://www.ictgozomalta.eu/cyber-security-awareness.html" rel="nofollow" target="_blank">http://www.ictgozomalta.eu/cyber-security-awareness.html</a><br />
<br />
This site offers online safety resources for kids, teens, parents, educators, businesses (<a href="http://www.ictgozomalta.eu/cyber-security-awareness/cyber-security-for-business/work-force-training-videos.html" rel="nofollow" target="_blank">Work Force Training Videos</a>, <a href="http://www.ictgozomalta.eu/cyber-security-awareness/cyber-security-for-business/more-resources-for-small-business.html">Resources for Small Business</a>), and <a href="http://www.ictgozomalta.eu/cyber-security-awareness/cyber-security-for-techies.html" rel="nofollow" target="_blank">techies</a> in all European Union languages.</div>
<div>
<br />
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<div>
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure" rel="nofollow" target="_blank">Follow @zqure</a><br />
<br /></div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-37630143083993537152014-12-15T00:00:00.000+12:002014-12-15T00:00:01.330+12:00Security Awareness, Posters, Infographics, Presentations, VideosSecurity Awareness Posters, Infographics, Presentations, Videos:<br />
<br />STH. Secure the Human<br /><a href="http://www.securingthehuman.org/resources/posters" rel="nofollow" target="_blank">http://www.securingthehuman.org/resources/posters</a><br />
<br />Security Intelligence<br /><a href="http://securityintelligence.com/top-10-cyber-security-infographics/" rel="nofollow" target="_blank">http://securityintelligence.com/top-10-cyber-security-infographics/</a><br />
<br />End User Security Awareness Presentation, Cristian Mihai, PWC<br /><a href="http://www.slideshare.net/frostinel/end-user-security-awareness-presentation-presentation" rel="nofollow" target="_blank">http://www.slideshare.net/frostinel/end-user-security-awareness-presentation-presentation</a><br />
<br />How to Build a Winning Security Awareness Program, CommLab India<br /><a href="http://www.slideshare.net/CommLab/how-to-build-a-winning-security-awareness-program-25843930" rel="nofollow" target="_blank">http://www.slideshare.net/CommLab/how-to-build-a-winning-security-awareness-program-25843930</a><br />
<br />Creating a Meaningful Security Awareness Program<br /><a href="http://www.slideshare.net/bwoelk/engage-creating-a-meaningful-security-awareness-program" rel="nofollow" target="_blank">http://www.slideshare.net/bwoelk/engage-creating-a-meaningful-security-awareness-program</a><br />
<br />eMail Security Awareness, Dale Rapp<br /><a href="http://www.slideshare.net/CBIZinc/social-engineering-audit-security-awareness" rel="nofollow" target="_blank">http://www.slideshare.net/DaleRapp/email-security-awareness</a><br />
<br />Social Engineering Audit and Security Awareness, CBIZ Inc<br /><a href="http://www.slideshare.net/CBIZinc/social-engineering-audit-security-awareness" rel="nofollow" target="_blank">http://www.slideshare.net/CBIZinc/social-engineering-audit-security-awareness</a><br />
<br />CyberSecurity Awareness for Students, Kandarp Shah<br /><a href="http://www.slideshare.net/skandarp/cyber-security-awareness-for-students" rel="nofollow" target="_blank">http://www.slideshare.net/skandarp/cyber-security-awareness-for-students</a><br />
<br />Google Security Awareness Videos<br /><a href="https://www.youtube.com/user/GoogleCyberSecurity" rel="nofollow" target="_blank">https://www.youtube.com/user/GoogleCyberSecurity</a><br />
<br />Raising information security awareness, TerraNova Training<br /><a href="http://www.slideshare.net/Terranovatraining/terranovatraining-isa" rel="nofollow" target="_blank">http://www.slideshare.net/Terranovatraining/terranovatraining-isa</a><br />
<br />Security Awareness Videos at antispam.br (in Portuguese)<br /><a href="http://www.antispam.br/videos/" rel="nofollow" target="_blank">http://www.antispam.br/videos/</a><br />
<br />Oman CERT Security Awareness Video Channel (in Arabic)<br /><a href="https://www.youtube.com/profile?user=omancert" rel="nofollow" target="_blank">https://www.youtube.com/profile?user=omancert</a><br />
<br />
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure" rel="nofollow" target="_blank">Follow @zqure</a><br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-7529454866992771542014-12-08T00:00:00.000+12:002014-12-08T00:00:00.608+12:00Best Password VaultTake it from Leo--<br />
<br />
<a href="http://techguylabs.com/episodes/1136/whats-best-password-vault" rel="nofollow" target="_blank">What's the best password vault? | The Tech Guy</a>: <i>"Carla is overwhelmed by a ton of passwords she has to remember. What can she uses for just one password to rule them all? Leo says to use a password vault that will generate a unique and strong password that's difficult to crack. The best passwords are long and random with a combination of upper and lower case, numbers, letters and punctuation. That's what a password vault generator will buy you. Leo advises using LastPass. You can download and use it for free, or pay $12 for some additional features including mobile use. Other options include DashLane for the Mac, One Password for the Mac. And to remember your one lastpass password, use a pneumonic, where you use the first letter of each word of a phrase with punctuation, and then toss in a phone number. It will look random, but easy to remember or at least reconstruct."</i><br />
<br />
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure" rel="nofollow" target="_blank">Follow @zqure</a><br />
<div>
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-51407918555405547672014-12-01T00:00:00.000+12:002014-12-01T00:00:02.217+12:00Russian Anonymous Marketplace, RAMP, Dark Web Drugs<a href="http://www.wired.com/2014/11/oldest-drug-market-is-russian/" rel="nofollow" target="_blank">How a Russian Dark Web Drug Market Outlived the Silk Road (And Silk Road 2) | WIRED</a>: <i>"... For more than two and a half years, the Russian Anonymous Marketplace, or RAMP, has maintained a thriving business in the Dark Web drug trade, offering one of the Internet’s widest arrays of narcotics to its Russian-speaking clientele. That’s roughly as long a tenure online as the original Silk Road achieved before it was seized in an FBI bust in October of last year. And it’s far longer than the new generation of anonymous drug markets that followed the Silk Road, including more than a dozen sites taken down last week in a massive coordinated police action. The largest of those seized sites, Silk Road 2, lasted exactly one year to the day...." (read more at the link above)</i><br />
<i><br /></i>
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure">Follow @zqure</a><br />
<br />Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-4189358976713359589.post-53271029880974560772014-11-24T00:00:00.000+12:002014-11-24T00:00:01.525+12:00How to encrypt Carbonite data<i>Leo Laporte answers--</i><br />
<br />
<a href="http://techguylabs.com/episodes/1136/how-do-i-encrypt-my-carbonite-data" rel="nofollow" target="_blank">How do I encrypt my Carbonite data? | The Tech Guy</a>:<i> "Bob uses BitLocker to secure his data. And when he uses Carbonite, he sees that his data is unencrypted when restoring it. Leo says that as long as you're logged in, bitlocker has unencrypted the data. And when you log out, it encrypts it again. But the good news is that when you back up Carbonite, the backup is encrypted. And Carbonite allows you to make the data completely encrypted. It's in the settings. BTW using BitLocker requires certificates. So make sure they're backed up. If they get corrupted, you'll lose the ability to access your encrypted data even if you know the password. There's also a good program called SpiderOak. It works like DropBox but uses end to end encryption."</i><br />
<br />
<br />
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure" rel="nofollow" target="_blank">Follow @zqure</a><br />
<div>
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-53151344401502969702014-11-17T00:00:00.000+12:002014-11-17T00:00:01.053+12:00Threat Intelligence Not So Intelligent, Global Financial System Vulnerable<a href="http://www.csoonline.com/article/2689609/network-security/threat-intelligence-firm-mistakes-research-for-nation-state-attack.html?utm_source=twitterfeed&utm_medium=twitter" rel="nofollow" target="_blank">Threat Intelligence firm mistakes research for nation-state attack | CSO Online</a>: <i>"If anything, this incident proves two things; Redpoint scans will be detected by a honeypot, and when it comes to threat intelligence - sometimes it's not all that smart." (read more at link above)</i><br />
<i><br /></i>
<a href="http://nyti.ms/1rQi4vG" rel="nofollow" target="_blank">JPMorgan Chase Says More Than 76 Million Accounts Compromised in Cyberattack - NYTimes.com</a>: <i>"Hackers were able to burrow deep into JPMorgan’s computer systems, accessing the accounts of more than 90 servers — a breach that underscores just how <b>vulnerable the global financial system</b> is to cybercrime. Until now, most of the largest hack attacks on corporations have been confined to retailers like Target and Home Depot."</i><br />
<i><br /></i>
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure">Follow @zqure</a><br />
<div>
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-51391032059159141732014-11-10T00:00:00.000+12:002014-11-10T00:00:05.744+12:00Voice Hackers Will Be Talking Their Way Into Your TechnologyWill Siri be indicted as a co-conspirator?<br />
<br />
<a href="http://www.forbes.com/sites/jasperhamill/2014/09/29/voice-hackers-will-soon-be-talking-their-way-into-your-technology/" rel="nofollow" target="_blank">Voice Hackers Will Soon Be Talking Their Way Into Your Technology</a>: "... this scary reality is not as far away as it might seem, as security researchers have already managed to <a href="http://www.forbes.com/sites/kashmirhill/2014/09/15/siri-lets-anyone-bypass-your-iphones-lockscreen-feature-or-bug/" rel="nofollow" target="_blank">trick Siri</a> into letting them bypass the lock screen on an iPhone and post <a href="http://www.forbes.com/facebook-ipo/" rel="nofollow" target="_blank">Facebook</a> messages, access call history, send text messages and fire off emails. “Microphones should be disabled immediately and our current recommendation is that the user switch off features [involving voice commands],” he said in a phone interview with Forbes. “At the moment, leaving biometric technology as it is today is like leaving a computer without a password and just allowing anyone to walk by, click and take an action. “We realized there is something very basic here that everyone seems to have forgotten: authentication. If you have a smart TV at home, for instance, it will respond to a synthesized voice as well as yours.”..."<br />
<br />
<br />
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure">Follow @zqure</a><br />
<div>
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-3581357794161163782014-11-03T00:00:00.000+12:002014-11-03T00:00:19.193+12:00Eugene Kaspersky: How to Deal With the Threat of Cyber-Attacks (video)<a href="http://www.bloomberg.com/video/how-to-deal-with-the-threat-of-cyber-attacks-r2X6FksSSa6sjrCtqmynYg.html">How to Deal With the Threat of Cyber-Attacks: Video - Bloomberg</a>: <object data="http://www.bloomberg.com/video/embed/r2X6FksSSa6sjrCtqmynYg?height=395&width=640" height="430" style="overflow: hidden;" width="640"></object><br />
<i>(Allow video to load after clicking play or go to link above)</i><br />
<div>
<br /></div>
Kaspersky Lab Founder and CEO Eugene Kaspersky discusses the threat from cyber-attacks on “Bottom Line.” (Source: Bloomberg 9/15)<br /><br /><b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure">Follow @zqure</a><br />
<div>
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-27541244561187649912014-10-27T00:00:00.000+12:002014-10-27T00:00:04.192+12:00Scam: Computer Hackers Claim to be Law EnforcementAnd corrupt law enforcement who want bribes!--<br />
<br />
<a href="http://www.wltx.com/story/news/local/2014/10/18/scam-computer-hackers-claiming-to-be-law-enforcement/17498665/" rel="nofollow" target="_blank">Scam: Computer Hackers Claiming to be Law Enforcement</a>: <i>"The Newberry County Sheriff's Department is warning computer owners about a scam involving hackers posing as law enforcement. According to deputies, scammers are using a virus to encrypt computer owners data and take over their computer. The scammers are claiming to be with law enforcement or FBI and accusing owners of looking at child pornography. They ask for a sum of money to be sent to a location to unlock the computer and clean it of pornography. Deputies say the hackers threaten to keep the owners' computer data and arrest them if they do not comply...."</i><br />
<i><br /></i>
<i><br /></i>
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure">Follow @zqure</a><br />
<div>
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-1389202809431813792014-10-20T00:00:00.000+12:002014-10-20T00:00:00.633+12:00Cyber attacks, Cybersecurity, Cyber insurance<a href="https://www.google.com/url?rct=j&sa=t&url=http://thehill.com/policy/technology/216840-hack-attacks-spur-calls-for-cyber-insurance&ct=ga&cd=CAEYECoUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNE05FDcyrh6_gby-BNOWCQ9heGY5Q" rel="nofollow" target="_blank">Hack attacks spur calls for cyber insurance</a><br />The Hill<br />Cyber insurance legally protects companies after a data breach, covers ... “If I am a company and I buy cybersecurity insurance, if I have bad security ...<br />
<br />
<a href="https://www.google.com/url?rct=j&sa=t&url=http://www.entrepreneur.com/article/237142&ct=ga&cd=CAEYDyoUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNGAa3foS2fEA039-7zKXNmWgqorJg" rel="nofollow" target="_blank">Prepare for the Attack of the Data-Sucking Cyber Zombies</a><br />Entrepreneur (blog)<br />Having trained professionals who understand cyber security and know what to look for is essential to an overall security strategy. Whether you employ ...<br />
<br />
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure">Follow @zqure</a><br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-55463579905191889492014-10-13T00:00:00.000+12:002014-10-13T00:00:00.037+12:00Cyber Attacks, Cyber Crime, Business Loss <a href="https://www.google.com/url?rct=j&sa=t&url=http://www.forbes.com/sites/christopherskroupa/2014/09/04/cyber-crime-means-business-potentially-yours/&ct=ga&cd=CAEYACoUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNH2Uw0vTpgnTjKpyGYVnvLwURC7XQ" rel="nofollow" target="_blank">Cyber Crime Means Business- Potentially Yours</a><br />Forbes<br />How to Manage the Growing Risk of Cyber Attacks (Wiley, 2014) and THREAT! ... The loss of this information is a national economic security crisis.<br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://www.nasdaq.com/article/data-breach-specter-3-cyber-security-stocks-to-benefit-analyst-blog-cm386938&ct=ga&cd=CAEYACoUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNFmv_p6auqNjdCHXSYreSwmQTDxZA" rel="nofollow" target="_blank">Data Breach Specter: 3 Cyber Security Stocks to Benefit - Analyst Blog</a> - NASDAQ<br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://usa.marsh.com/ProductsServices/MarshSolutions/ID/41865/Privacy-and-Computer-Security-Protection-for-Cyber-Catastrophe-Placements.aspx&ct=ga&cd=CAEYACoUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNEcC9t-Z8HMxOxwq2gDEak-yL-Kyw" rel="nofollow" target="_blank">Cyber-CAT brochure</a> - marsh.com<br /><br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://www.ft.com/cms/s/0/9de4a842-2ef6-11e4-a054-00144feabdc0.html&ct=ga&cd=CAEYAyoUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNH9G9GO_jgr-41K8taRWPbm2pDXEw" rel="nofollow" target="_blank">Experts warn banks of more cyber attacks</a><br />Financial Times<br />Cyber security experts have warned of a constant threat of organised cyber criminals on the financial sector after the US Federal Bureau of ...<br /><br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://www.informationweek.com/government/cybersecurity/cyber-security-education-remove-the-limits/a/d-id/1306950&ct=ga&cd=CAEYBCoUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNH5PIt9eNkKt6IWZKAzQ7DKt58XAQ" rel="nofollow" target="_blank">Cyber Security Education: Remove The Limits</a><br />InformationWeek<br />Historically, there have been two perceived approaches to cyber security -- the vertical, technical approach and the more horizontal, strategic ...<br /><br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://q13fox.com/2014/09/04/cyber-security-is-huge-problem-affecting-millions-of-americans/&ct=ga&cd=CAEYCCoUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNEqRiJovbfe_3WmOTpdoRnxpl_-DQ" rel="nofollow" target="_blank">HACKERS STRIKE: It's a huge problem affecting millions of Americans</a><br />Q13 FOX<br />“Cyber security, I think, is the biggest threat facing personal privacy, national security, and the national economy. It affects everyone,” U.S. Attorney ...<br /><br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://techcrunch.com/2014/09/06/why-breach-detection-ss-your-new-must-have-cyber-security-tool/&ct=ga&cd=CAEYCioUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNGJcpFaznWB5PUMeuOB7gulY3bGrw" rel="nofollow" target="_blank">Why Breach Detection Is Your New Must-Have, Cyber SecurityTool</a><br />TechCrunch<br />Cyber attacks are all over the news, and it seems like no one is immune — Home Depot, Target, Adobe and eBay included. So why are CIOs still ...<br />
<br />
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure">Follow @zqure</a><br />
<br />Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-4189358976713359589.post-46513936451605088342014-10-06T00:00:00.000+12:002014-10-06T00:00:01.313+12:00North Korea, Cyber Warfare, Data Breaches, National Cybersecurity Center<a href="https://www.google.com/url?rct=j&sa=t&url=http://www.zdnet.com/north-korea-cyber-warfare-capabilities-exposed-7000033192/&ct=ga&cd=CAEYBSoUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNEC6Ip3gtfOMXPz_27EwyXB9QeEjg" rel="nofollow" target="_blank">North Korea cyber warfare capabilities exposed</a><br />ZDNet<br />North Korea's cyber warfare capabilities are on the rise despite being ... training up the next generation of cybersecurity and cyber warfare experts.<br /><br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://www.kcrg.com/subject/news/cyber-security-more-of-a-priority-after-highly-publicized-data-breaches-20140904&ct=ga&cd=CAEYBioUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNFMFQuvSPWBlF1X_tATEb1QP1FqDw" rel="nofollow" target="_blank">Cyber security more of a priority after Highly publicized data breaches</a><br />KCRG<br />CEDAR RAPIDS — More data breaches, including stolen credit card numbers and hacked personal photos of celebrities, has both individuals and ...<br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://www.grassley.senate.gov/news/news-releases/grassley-cyber-security-remarks-national-cyber-security-alliance-seminar&ct=ga&cd=CAEYBioUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNHDPGvWx9c1kY7uNXYZIrw_UTHhkw" rel="nofollow" target="_blank">Grassley Cyber Security Remarks at National Cyber Security Alliance Seminar</a> - Senator Chuck Grassley<br /><br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://www.washingtonpost.com/business/capitalbusiness/virginia-accelerator-welcomes-new-cohort-of-cybersecurity-companies/2014/09/01/df730ec4-2fbf-11e4-994d-202962a9150c_story.html&ct=ga&cd=CAEYByoUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNGmaS5V9ylDPg86LXNZoRTYMaODYQ" rel="nofollow" target="_blank">Virginia accelerator welcomes new cohort of cybersecurity companies</a><br />Washington Post<br />Maryland is home to the U.S. Cyber Command at Fort Meade and the soon-to-be-built National Cybersecurity Center of Excellence in Montgomery ...<br />
<br /><b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure">Follow @zqure</a><br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-14427502285719423602014-09-29T00:00:00.000+12:002014-09-29T00:00:00.439+12:00NATO, Cyber attack, mutual defense<a href="https://www.google.com/url?rct=j&sa=t&url=http://www.theregister.co.uk/2014/09/03/nato_article_v_mutual_defence_principle_applies_to_cyberspace/&ct=ga&cd=CAEYCyoUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNEAHG-KVZVXWkERxnw-szlAWsRw1g" rel="nofollow" target="_blank">NATO nations 'will respond to a Cyber attack on one as though it were on all'</a><br />Register<br />NATO is set to agree a new cyber defence policy that would mean any severe ... through diplomatic channels, according to one seasoned IT security pro. ... The Tallinn Manual on the International Law Applicable to Cyber Warfare, ...<br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://uk.reuters.com/article/2014/09/05/us-nato-cybersecurity-idUKKBN0H013P20140905&ct=ga&cd=CAEYCyoUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNGRDtn1i9nesVNVsZF5VezXtxdgOA" rel="nofollow" target="_blank">NATO agrees cyber attack could trigger military response</a> - Reuters UK<br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://arstechnica.com/security/2014/09/in-case-of-cyberattack-nato-members-ready-to-pledge-mutual-defense/&ct=ga&cd=CAEYCyoUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNEQgVcyFnltfmQ8xrF6bo_UL4_3lw" rel="nofollow" target="_blank">In case of cyber attack: NATO members ready to pledge mutual defense</a> - Ars Technica<br /><br /> <a href="https://www.google.com/url?rct=j&sa=t&url=http://www.informationweek.com/government/cybersecurity/wanted-by-dhs-breakout-ideas-on-domestic-cybersecurity-/d/d-id/1306842&ct=ga&cd=CAEYDCoUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNG487GdV51SvAuGopYF5LTLFp0qJg" rel="nofollow" target="_blank">Wanted By DHS: Breakout Ideas On Domestic Cybersecurity</a><br />InformationWeek<br />Department of Homeland Security plans to fund cyber defense research efforts to develop pragmatic tools that can be deployed quickly, says Forrester ...<br /><br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://thehill.com/policy/technology/216905-this-week-in-tech-lawmakers-take-on-cybersecurity&ct=ga&cd=CAEYDSoUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNH17JydGcOoPg3abPcJdBB-_7lFag" rel="nofollow" target="_blank">This Week in Tech: Lawmakers take on cybersecurity</a><br />The Hill<br />The event is a joint effort by retail and financial services industries that have often sparred in the past but are joining forces to press for stronger cyber ...<br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://thehill.com/opinion/op-ed/217151-lets-pass-cybersecurity-legislation&ct=ga&cd=CAEYDSoUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNHOJcSVLItPN617OhiZC-9WUNxA4A" rel="nofollow" target="_blank">Let's pass cybersecurity legislation</a> - The Hill<br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://fcw.com/articles/2014/09/08/news-in-brief-september-8.aspx&ct=ga&cd=CAEYDSoUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNFlh9lmc5RHTXCLkqZyQRedrNF7rg" rel="nofollow" target="_blank">Security clearances, contractor oversight, NATO cyber and more</a> - FCW.com<br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://www.ktbs.com/story/26474837/cyber-innovation-center-receives-5m-department-of-homeland-security-grant&ct=ga&cd=CAEYDSoUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNFtxQRmWaGRkhhL0OzCeYy1jw-I8A" rel="nofollow" target="_blank">Cyber Innovation Center receives $5M Department of Homeland Security grant</a> - KTBS<br /><br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://www.out-law.com/en/articles/2014/september/uk-launches-online-course-to-promote-security-in-cyber-space/&ct=ga&cd=CAEYEioUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNEFJPMC248I_D8dMZIdY_RbSKGJYg" rel="nofollow" target="_blank">UK launches online course to promote security in cyber space</a><br />Out-Law.com<br />The free 'Massive Open Online Course' (MOOC) is backed by the UK's NationalCyber Security Programme, which is investing £860 million over five ...<br /><a href="https://www.google.com/url?rct=j&sa=t&url=https://www.gov.uk/government/news/government-supports-uks-next-generation-of-cyber-security-professionals&ct=ga&cd=CAEYEioUMTYwODc3MjYwMzA5ODAxNjc4MjMyGmY4ODY3NWRlYmY5YmQwNGQ6Y29tOmVuOlVT&usg=AFQjCNE5oiNZOBaLHI-F-kaoO0CGrE4qyg" rel="nofollow" target="_blank">Government supports UK's next generation of cyber security professionals</a> - Gov.uk<br /><br /><b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure">Follow @zqure</a><br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-13609359420487076812014-09-22T00:00:00.000+12:002014-09-22T00:00:00.996+12:00Cybersecurity, Passwords, TechnologyCybersecurity NEWS:<br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://www.sfgate.com/news/article/Beyond-passwords-taking-cybersecurity-to-the-5754043.php&ct=ga&cd=CAAYADIaYTM5M2Y2OTNkYTQ2NTg2NDpjb206ZW46VVM&usg=AFQjCNG5UIjQx5tOFFERh5rM7ot0r8iIAQ" rel="nofollow" target="_blank"><img alt="" src="https://encrypted-tbn1.gstatic.com/images?q=tbn:ANd9GcTT-Js44amzhKUqHIuAGd4Qh8wkG1Y0Txbx6eH7XSjqa1HUcfRfPp2j3U6E3WyM5H85xOK8joQ" /><br />SFGate</a><br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://www.sfgate.com/news/article/Beyond-passwords-taking-cybersecurity-to-the-5754043.php&ct=ga&cd=CAAYADIaYTM5M2Y2OTNkYTQ2NTg2NDpjb206ZW46VVM&usg=AFQjCNG5UIjQx5tOFFERh5rM7ot0r8iIAQ" rel="nofollow" target="_blank">Beyond passwords: taking cybersecurity to the next level</a><br />SFGate<br />The password has failed. That ubiquitous annoyance of the digital age - the computer password - has proved itself to be profoundly unsafe. People ...<br /><br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://www.kansas.com/news/local/article2102134.html&ct=ga&cd=CAAYATIaYTM5M2Y2OTNkYTQ2NTg2NDpjb206ZW46VVM&usg=AFQjCNGBFtieh3HIX5fAwXQhitU66PPYVw" rel="nofollow" target="_blank">People too trusting when it comes to their cybersecurity, experts say</a><br />Kansas.com<br />College jobs experts say cybersecurity students like Brewer will in the future make a great deal of money – six figures, some of them. “He's a great guy, ...<br /><br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://www.investmentnews.com/article/20140914/REG/309149996/cybersecurity-a-major-priority-in-independent-broker-dealers-2015&ct=ga&cd=CAAYAjIaYTM5M2Y2OTNkYTQ2NTg2NDpjb206ZW46VVM&usg=AFQjCNEHkHJUduNTLcvJ0e1aLvmPL596yg" rel="nofollow" target="_blank">Cybersecurity a major priority in independent broker-dealers' 2015 tech budgets</a><br />InvestmentNews<br />Cybersecurity concerns are front and center for independent broker-dealers as they plan next year's technology budgets, according to an ...<br /><br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://www.haaretz.com/news/diplomacy-defense/.premium-1.615740&ct=ga&cd=CAAYAzIaYTM5M2Y2OTNkYTQ2NTg2NDpjb206ZW46VVM&usg=AFQjCNH5o2b_FF241EJUk_WpjjWU8EXhCg" rel="nofollow" target="_blank"><img alt="" src="https://encrypted-tbn3.gstatic.com/images?q=tbn:ANd9GcRqo2xlR74vYg-_O2MTnxwxzN88H04pUCvqmQ_IOQxOA61m6OTjLEkhVtTNygBkGzS0bHDrj9Me" /><br />Haaretz</a><br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://www.jpost.com/Israel-News/Watch-Live-Netanyahu-addresses-cyber-security-conference-375290&ct=ga&cd=CAAYAzIaYTM5M2Y2OTNkYTQ2NTg2NDpjb206ZW46VVM&usg=AFQjCNE-DGuYjgbphHZJB7Ksg6q-0vQWfg" rel="nofollow" target="_blank">Iran still Israel's biggest threat, PM says at cyber conference</a><br />Jerusalem Post<br />Prime Minister Binyamin Netanyahu addressed the fourth Annual InternationalCybersecurity Conference at Tel Aviv University on Sunday, pushing ...<br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://www.jpost.com/Breaking-News/PM-speaks-at-cybersecurity-conference-375314&ct=ga&cd=CAAYAzIaYTM5M2Y2OTNkYTQ2NTg2NDpjb206ZW46VVM&usg=AFQjCNGteXLgbEKPZHYiMFDgqImSUhXKIg" rel="nofollow" target="_blank">PM speaks at cybersecurity conference</a> - Jerusalem Post<br /><br /><a href="https://www.google.com/url?rct=j&sa=t&url=http://www.natlawreview.com/article/cleared-intelligence-contractors-readying-new-cybersecurity-reporting-requirements&ct=ga&cd=CAAYBDIaYTM5M2Y2OTNkYTQ2NTg2NDpjb206ZW46VVM&usg=AFQjCNGNBOdrI1qZHa_RVzZ4MOy50tE4Ew" rel="nofollow" target="_blank">Cleared Intelligence Contractors Readying for New Cybersecurity Reporting Requirements</a><br />The National Law Review<br />When it became law on July 7, 2014, the 2014 Intelligence Authorization Act (“IAA”) gave the Director of National Intelligence (“DNI”) 90 calendar days ...<br /><br />more news below (web link on mobile below)<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure" rel="nofollow" target="_blank">Follow @zqure</a><br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-73929180252593832212014-09-15T00:00:00.000+12:002014-09-15T00:00:01.518+12:00Protecting Trade Secrets in the Digital Age <a href="http://www.jdsupra.com/legalnews/protecting-trade-secrets-in-the-digital-84805/?utm_source=LU_Emails">Protecting Trade Secrets in the Digital Age Requires Extra Vigilance</a>: "Technology allows businesses around the world to easily communicate and access data, increasing both business opportunities and worker productivity. However, this same technology also makes corporate data more vulnerable to theft and harder to protect. Lost or stolen data has significant financial repercussions; misplaced devices or server crashes are estimated to cost the average business $586,000 a year. Data theft was recently estimated to cost companies $250 billion a year, according to the National Crime Prevention Council. Intellectual property — customer lists, a secret recipe, proprietary product blueprints, financial data, merger and acquisition plans, etc. — faces a variety of threats as more businesses and employees take advantage of wireless and portable devices...." (read more at link above)<br />
<br />
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure">Follow @zqure</a><br />
<div>
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-28782541149475602422014-09-08T00:00:00.000+12:002014-09-08T00:00:05.209+12:00Network-Based Steganography Threats<a href="http://www.technologyreview.com/view/529071/the-growing-threat-of-network-based-steganography/?utm_campaign=newsletters&utm_source=newsletter-weekly-web&utm_medium=email&utm_content=20140723" rel="nofollow" target="_blank">The Growing Threat Of Network-Based Steganography | MIT Technology Review</a>: <i>"... They point out that before a countermeasure that does do this can be built, researchers will need to come up with a new set of fundamental approaches to counter the newly evolving forms of steganography. One thing is for sure: the detection and prevention of network steganography is set to become increasingly challenging as the threat from malware such as Duqu spreads. Be warned!</i><br />
<i>Ref: arxiv.org/abs/1407.2029 : Hidden and Uncontrolled – On the Emergence of Network Steganographic Threats"</i><br />
<br />
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure" rel="nofollow" target="_blank">Follow @zqure</a><br />
<div>
<br /></div>
<div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-495321925225414702014-09-01T00:00:00.000+12:002014-09-01T00:00:05.790+12:00Exploit Kits, The Scourge of Cyberspace<a href="http://www.sfgate.com/technology/article/Dark-Net-reveals-how-hackers-exploit-5585720.php" rel="nofollow" target="_blank">Dark Net reveals how hackers exploit vulnerabilities - SFGate</a>: <i>".... Users think they are clicking legitimate links to legitimate websites, and they still get infected with malware that carries bad consequences. For example, a hacker can encrypt a users' files - documents, photographs or videos - in a "crypto locker" and not release the data until the victim pays ransom... Nearly 70 percent of exploit kits originate in Russia, where cybercrime laws are relatively weak, according to a report by research firm <a href="http://www.sfgate.com/?controllerName=search&action=search&channel=technology&search=1&inlineLink=1&query=%22Solutionary%22" rel="nofollow" target="_blank">Solutionary</a>. In recent years, a thriving, coordinated underground economy has emerged, a place where criminals swap cash to develop and update the kits, identify targets and rent the "weapons" for as little as $50 a day. "These black markets are growing in size and complexity," according to a report by Rand Corp., a Washington think tank. "The hacker market - once a varied landscape of discrete, ad hoc networks of individuals initially motivated by little more than ego and notoriety - has emerged as a playground of financially driven, highly organized and sophisticated groups.... " (read more at link above)</i><br />
<br />
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure" rel="nofollow" target="_blank">Follow @zqure</a><br />
<div>
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-15808271346065479982014-08-25T00:00:00.000+12:002014-08-25T00:00:00.715+12:00Protecting Trade Secrets, Remote Worker Security, Mobile employees <a href="http://www.jdsupra.com/legalnews/protecting-trade-secrets-in-the-digital-84805/?utm_source=LU_Emails" rel="nofollow" target="_blank">Protecting Trade Secrets in the Digital Age Requires Extra Vigilance | WeComply, a Thomson Reuters business - JDSupra</a>:<br /><br />Remote Worker Security -- Mobile employees using portable devices increase the potential for data loss in a variety of ways:<br />
<ul>
<li>Transferring files from a work device to an unprotected home computer or personal device.</li>
<li>Using personal communications that don't meet corporate IT security standards.</li>
<li>Discussing sensitive company matters where others can hear the conversation.</li>
<li>Failing to use a laptop privacy guard when working remotely in a public place.</li>
<li>Failing to properly safeguard mobile devices against loss or theft.</li>
<li>Using hotel or other public "hot spots" where potential cybercriminals can steal information or establish a rogue network to steal information.</li>
</ul>
<br />
(read more at link above)<br />
<br />
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure" rel="nofollow" target="_blank">Follow @zqure</a><br />
<div>
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-15332813119417414712014-08-18T00:00:00.000+12:002014-08-18T00:00:00.785+12:00Andreessen Horowitz, Cyber Security Firm Tanium (video)<a href="http://www.bloomberg.com/video/why-andreessen-is-investing-90m-in-tanium-Y4AbTzyyRH2nnfPhyJYwxQ.html" rel="nofollow" target="_blank">Why Andreessen Is Investing $90M in Tanium: Video - Bloomberg</a>: <object data="http://www.bloomberg.com/video/embed/Y4AbTzyyRH2nnfPhyJYwxQ?height=395&width=640" height="430" style="overflow: hidden;" width="640"></object><br />
<i>(Allow video to load after clicking play or go to link above)</i><br />
<div>
Steven Sinofsky, a board partner at Andreessen Horowitz, discusses the company's investment in cyber security firm Tanium with Cory Johnson on "Bloomberg West." Bloomberg LP, the parent of Bloomberg News, is an investor in Andreessen Horowitz. (Source: Bloomberg, June 23)</div>
<br />
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure" rel="nofollow" target="_blank">Follow @zqure</a><br />
<div>
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-59462803068312105982014-08-11T00:00:00.000+12:002014-08-11T00:00:00.551+12:00FBI Fights Against Chinese Cyber-Espionage<a href="http://www.foreignpolicy.com/articles/2014/05/27/exclusive_inside_the_fbi_s_fight_against_chinese_cyber_espionage" rel="nofollow" target="_blank">Exclusive: Inside the FBI's Fight Against Chinese Cyber-Espionage</a>: "SolarWorld was fighting a losing battle. The U.S. subsidiary of the German solar panel manufacturer knew that its Chinese competitors, backed by generous government subsidies, were flooding the American market with steeply discounted solar panels and equipment, making it practically impossible for U.S. firms to compete. What SolarWorld didn't know, however, was that at the same time it was pleading its case with U.S. trade officials, Chinese military hackers were breaking into the company's computers and stealing private information that would give Chinese solar firms an even bigger unfair advantage, including the company's pricing and marketing strategies..."<br />
<br />
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure">Follow @zqure</a><br />
<div>
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-46542930459381826482014-08-04T00:00:00.000+12:002014-08-04T00:00:00.051+12:00Evolving Threat, Amplification DDoS Attacks<a href="http://blogs.verisigninc.com/blog/entry/the_evolving_threat_of_amplification" rel="nofollow" target="_blank">The Evolving Threat of Amplification DDoS Attacks | Between the Dots</a>: "...The only real way to defend against attacks of this size is, unsurprisingly, massive network infrastructure that is engineered to withstand very large volumes of traffic. Unfortunately, this isn’t how most customer networks are designed, and it’s certainly cost prohibitive for an organization to keep scaling up the network to match the ever-increasing size of these attacks. It’s an unwinnable arms race; attackers will always have access to more bandwidth than you. Leveraging a third-party cloud-based DDoS protection service like Verisign’s is likely to provide the best protection against these attacks. Our infrastructure is scaled and architected to defend against the largest-known attacks. Furthermore, we operate a fully redundant and interconnected network backbone to help ensure a massive attack doesn’t impact any one site or our ability to protect our customers...."<br />
<br />
More info: For more information about DDoS trends, read <a href="http://www.verisigninc.com/en_US/website-availability/ddos-protection/ddos-report/index.xhtml?cmp=blog" rel="nofollow" target="_blank">Q1 2014 DDoS Trends report</a><br />
<br />
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure" rel="nofollow" target="_blank">Follow @zqure</a><br />
<div>
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-47544142450186687802014-07-28T00:00:00.000+12:002014-07-28T00:00:01.285+12:00Cybercrime A Growth Industry, $445 Billion Lost<a href="http://www.businessweek.com/news/2014-06-09/cybercrime-remains-growth-industry-with-445-billion-lost#p1" rel="nofollow" target="_blank">Cybercrime Remains Growth Industry With $445 Billion Lost - Businessweek</a>: <i>"Cybercrime remains a growth industry. That’s the main message from former U.S. intelligence officials, who in a report today outlined scenarios for how $445 billion a year in trade theft due to computer hackers will worsen. They warned that financial companies, retailers and energy companies are at risk from thieves who are becoming more sophisticated at pilfering data from their servers...." (read more at link above)</i><br />
<i><br /></i>
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure" rel="nofollow" target="_blank">Follow @zqure</a><br />
<div>
<br /></div>
<script src="http://platform.twitter.com/widgets.js" type="text/javascript"></script>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-4189358976713359589.post-2544233935886177662014-07-21T00:00:00.000+12:002014-07-21T00:00:00.076+12:00Governments use secret cables to tap phones<a href="http://www.telegraph.co.uk/technology/internet-security/10880208/Vodafone-governments-use-secret-cables-to-tap-phones.html" rel="nofollow" target="_blank">Vodafone: governments use secret cables to tap phones - Telegraph</a>: "Government agencies are able to listen to phone conversations live and even track the location of citizens without warrants using secret cables connected directly to network equipment, admits Vodafone today"<br />
<blockquote class="tr_bq">
<i>In some countries this means giving access to the content of phone calls and other electronic communications, or access to metadata such as the number of calls made, the numbers they were made to and the location of the caller when those calls were placed. In some countries, around six that Vodafone does business with but not including the UK, they are made to provide a "direct access" cable straight into their network to allow governments to siphon off any data they wish, without having to issue a warrant.</i></blockquote>
<br />
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure" rel="nofollow" target="_blank">Follow @zqure</a><br />
<div>
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4189358976713359589.post-11479689777475793232014-07-14T00:00:00.000+12:002014-07-14T00:00:00.258+12:00Singapore, Massive Cyber Security Breach (video)<a href="http://www.bloomberg.com/video/singapore-s-massive-cyber-security-breach-g7TPrUx9ShCtY5G9WbnV~Q.html">Singapore’s Massive Cyber Security Breach: Video - Bloomberg</a>: <object data="http://www.bloomberg.com/video/embed/g7TPrUx9ShCtY5G9WbnV~Q?height=395&width=640" height="430" style="overflow: hidden;" width="640"></object><br />
<i>(Allow video to load after clicking play)</i><br />
<br />
<i>Bloomberg’s Haslinda Amin reports on the largest cyber security breach in Singapore’s history, affecting over 3 million SingPass accounts. SingPass accounts allow Singapore’s residents to access 340 online transactions with government agencies. She speaks to John Dawson on Bloomberg Television’s “On The Move Asia. (Source: Bloomberg June 5)</i><br />
<br />
<b><i><span style="font-size: large;">more news below (web link on mobile below)</span></i></b><br />
<br />
<a class="twitter-follow-button" data-show-count="false" href="https://twitter.com/zqure" rel="nofollow" target="_blank">Follow @zqure</a><br />
<div>
<br /></div>
<script src="http://platform.twitter.com/widgets.js" type="text/javascript"></script>Unknownnoreply@blogger.com1