The Cybersecurity Myths That Small Companies Still Believe

28 Nov

High-profile breaches at Target (TGT), Home Depot (HD), and JPMorgan Chase (JPM) have put cybersecurity on the agenda for companies large and small  –  more…Bloomberg Businessweek

Cyber attacks discredit two US firms

20 Nov

Staples confirms POS malware attack  IT Governance.

FTC Finds Trust-e Not Very Trusty  the Security Ledger

US State Department network shut amid reports of cyber breach

19 Nov

A senior official told the Washington Post that there had been “activity of concern” but that none of the department’s classified systems had been compromised.  more..IT Governance

8-Year-Old Indian-Origin CEO to Give Lecture at Cyber Security Summit

16 Nov

The organisers said, “8 year old Reuben Paul gives keynote at Houston Security Conference.”  more…NDTV

Warning: Stocks Will Collapse by 50%

13 Nov

Billion-dollar investor Warren Buffett is rumored to be preparing for a crash as well. The “Warren Buffett Indicator,” also known as the “Total Market Cap to GDP Ratio,” is breaching sell-alert status and a collapse may happen at any moment.                                                                                                                                                                                          more…Money News

New technique makes phishing sites easier to create, more difficult to spot

7 Nov

Researchers have spotted a new technique used by phishers which could trick even more users into believing they are entering their information in a legitimate web form.  – more..

phish-05112014

Contactless Visa Cards exposed to risk of theft?

7 Nov

“With just a mobile phone we created a PoS terminal that could read a card through a wallet,” explained Martin Emms, the project leader. “All the checks are carried out on the card rather than the terminal so at the point of transaction, there is nothing to raise suspicions. By pre-setting the amount you want to transfer, you can bump your mobile against someone’s pocket or swipe your phone over a wallet left on a table and approve a transaction.  In our tests, it took less than a second for the transaction to be approved.”   –  more…Security Affairs

NEW ATTACK VECTOR ENABLES FILE DOWNLOADS WITHOUT UPLOAD

6 Nov

Once the malware is installed on the system, it can perform a wide range of tasks with administrator privileges, on the operating system level. For example, an attacker can execute OS commands that allow him to install other malware, steal data from the victim’s browsing session, or gain complete control over the targeted device. An attacker can also execute malicious OS scripts, and exploit vulnerabilities in other software installed on the compromised machine.                                                                                                                                                                                          more …HackingInsight

ISIS issued a manual for a safe use of Twitter and other media

5 Nov

The manual explains how to avoid surveillance of the Intelligence agencies, the document highlights how to prevent exposing location and/or key data using the popular social network Twitter –  more….  Security Affairs

HACKING INTO AN ISOLATED COMPUTER USING FM RADIO SIGNALS

4 Nov

AirHopper is a special type of keylogger because it uses radio frequencies to transmit data from a computer, all by exploiting the computer’s monitor display, in order to evade air-gap security measures.

“This is the first time that a mobile phone is considered in an attack model as the intended receiver of maliciously crafted radio signals emitted from the screen of the isolated computer,” according to a release by Ben Gurion University. – more @HackInsight

Makaseh Identity does away with userid’s and passwords and does more to authenticate a general user from a trusted site or guest.  

Follow

Get every new post delivered to your Inbox.

%d bloggers like this: