Cybersecurity threads are moving and evolving at a rapid pace and they are a lot more sophisticated than they were a couple of years ago. Cybercriminals even use techniques developed by government intelligence agencies. Everyone who lands on a malicious website can get infected.
“The explosion in mobile device use and mobile networking has exponentially increased the number of security threats [that] individuals face on a daily basis,” said Joe Ferrara, president and CEO of Wombat Security Technologies, a security-training firm based in Pittsburgh.
Your smartphone’s sensitive personal information can be broadcast over public airwaves.
Technology experts recommend to keep learning and explore new approaches to protect your network and to to stay ahead of the game.
Continue reading »
European Commission has launched public consultation on the evaluation and review of the European Union Agency for Network and Information Security (ENISA, whose current mandate will come to an end in 2020). ENISA is the Agency of the European Union tasked with contributing to the enhancement of the overall level of cybersecurity of the EU and its Member States.
The European Commission wants all interested stakeholders to share their views on ENISA’s past performances, as well as on a possible revision of its mandate in view of new challenges the EU faces in the cybersecurity field.
The consultation is open until 12 April 2017.
Ireland’s Data Protection Commissioner is stepping up its examination of the Yahoo Inc. data breach and is awaiting information from Yahoo regarding allegations on scanning of users’ emails for US government.
In September Yahoo confessed that in 2014 hackers had stolen the data of 500 million users. But just month later Yahoo was accused in using software checking millions of emails for specific information related to national security.
National Highway Traffic Safety Administration (NHTSA) has released best practice guidelines for vehicle cybersecurity. Guidelines are aimed to car makers and their purpose is to help improve car security. However, 22 pages document is non-binding – there’s no regulatory imperative requiring that car makers meet these standards.
UK’s National Audit Office (NAO) has found that government has breached personal data security nearly 9,000 times in a year. Most of breaches – about 6,000 – are on HMRC.
NAO found that 17 largest departments recorded 8,995 data breaches in years 2014-2015, but reported to the Information Commissioner (ICO) only 14 incidents. Although not all incidents shall be reported to ICO, NAO observed that lack of detail in the self-reporting data means it is not possible to determine how significant any of unreported breaches was.
A hackers group that calls itself the Shadow Brokers recently published on web and made accessible to everyone sophisticated hacking and surveillance tools. They claim that those tools come come from breach of NSA.
Released hacking tools exploit vulnerabilities in software that the vendor doesn’t know about (so called “zero day vulnerabilities”) and thus haven’t fixed – making everyone using this software a potential target. Published tools revel that United States government has been hacking for decades without big attention.
Spotify is making some users reset their passwords and the reason is – other websites keep getting hacked. There have been numerous huge data breaches affecting tens of millions of users.
Situation is even worse because of the fact that many people re-use their passwords across many services. So breach of one service where password was re-used compromises other sites and services as login details obtained on one service can be used to gain illicit access to accounts on other services and websites.
Therefore Spotify is forcing users whose details were exposed in some of these previous breaches to change their passwords.
It is estimated that by year 2020 there will be anywhere up to 50 billion internet-connected devices and 20% of them will be cars and or trucks. Such rapid explosion of use of connected devices explodes comes with security risks. Therefore US Department of Justice, together with other agencies, is evaluating and trying to predict those risks before they come into reality.
Manual of Harris Corp.’s surveillance device shows how police can spy on phones. Stingray devices can track phone’s connection to the simulated tower, information about its location, and certain “over the air” electronic messages sent to and from them. And that’s at minimum.