Endpoint, cloud, people key to future cyber security, says McAfee

Endpoint, cloud, people key to future cyber security, says McAfee

Endpoint devices, the cloud and people will be the security control points of the future, according to the chief of security firm McAfee. Looking to the future of cyber security, endpoints will be redefined, becoming devices of many different kinds, predicts Chris Young, CEO of McAfee. “Those devices will increasingly connect to applications that are running in the cloud, which will be the key control points for your cyber security architecture,” he told the opening session of the MPOWER Cybersecurity…

Read More Read More

A Nobel-Winning Solution to Cyber Security

A Nobel-Winning Solution to Cyber Security

Professor Richard Thaler this week collected a Nobel Prize for his insights into behavioral economics—the idea that, contrary to economic theory, humans are not rational actors when it comes to financial decisions, but can be nudged to make better choices. The most famous application of Thaler’s insight is a law that encourages firms to automatically enroll workers in 401K plans rather than require them to sign up. This simple nudge has dramatically increased the amount that tens of millions of…

Read More Read More

Energy Sector Ups Cybersecurity Amid Growing IT Threats

Energy Sector Ups Cybersecurity Amid Growing IT Threats

The energy sector is sharpening its focus on cybersecurity amid growing concerns about IT threats. The digitization of the grid and the proliferation of renewable energy create opportunities for hackers that haven’t been fully explored. Even in the last few weeks, several notable clean energy companies have taken steps to reduce the risk of a breach. Hackers might target renewable energy companies for the fun of it or to hold plant operations for ransom, said Menelaos Ioannidis, chief technology officer at Lightsource…

Read More Read More

Are The Equifax, SEC and Deloitte Cybersecurity Breaches Desensitizing Society To This Threat?

Are The Equifax, SEC and Deloitte Cybersecurity Breaches Desensitizing Society To This Threat?

Every organization has a series of high-risk crisis scenarios that are the most likely, high-impact, types of crises to strike. One of these high-risk scenarios, which pertains to every organization today, is a cybersecurity crisis. Now, the magnitude of the impact that a cybersecurity crisis risks presenting to your organization depends on the type of data, systems and operations that are particular to your brand. However, at the very least, you have employee personally identifiable information (PII) that you hold…

Read More Read More

Report: Android cybersecurity attacks up 40%, here are the top 3 threats

Report: Android cybersecurity attacks up 40%, here are the top 3 threats

We’ve all seen the news reports, again and again: A massive breach has occurred. Many millions of customer records have been obtained by hackers. The company in question has flubbed the response to the incident. Wall Street is punishing the company, and the stock has plummeted since the breach was reported. That opening to articles on almost-daily cyber crises has become all too familiar. The recent incident involving Equifax, the U.S. credit-reporting company, is particularly egregious and may make it…

Read More Read More

Report: Android cybersecurity attacks up 40%, here are the top 3 threats

Report: Android cybersecurity attacks up 40%, here are the top 3 threats

According to new research from Avast, released Monday, cyberattacks against Android smartphones and tablets are up 40%, year-over-year from Q2 2016. Typically, this averages about 1.2-1.7 million attacks per month, a press release said. “Mobile cybersecurity attacks are growing rapidly as hackers’ strategies become more agile and dangerous, and what’s at stake is mostly the user’s personal data and privacy,” Gagan Singh, general manager of Mobile and IoT at Avast, said in the release. The researchers found roughly 788 variations…

Read More Read More

TAKING STOCK OF TRUMP’S CYBERSECURITY EXECUTIVE ORDER SO FAR

TAKING STOCK OF TRUMP’S CYBERSECURITY EXECUTIVE ORDER SO FAR

By the time President Trump signed his Cybersecurity Executive Order on May 11, it had taken on a mythic air. The administration had produced a series of drafts soon after the inauguration that leaked, circulated, provoked criticism, and motivated refinements. While the months-long wait for the final product felt Godot-like, it ultimately received bipartisan praise for its thoughtfulness. But now, more than 110 days since the clock started, eight deadlines have passed, with eight more quickly approaching. Planning and information-gathering…

Read More Read More

3 Ways Blockchain Is Revolutionizing Cybersecurity

3 Ways Blockchain Is Revolutionizing Cybersecurity

The second quarter of 2017 was a wild one for blockchain companies and investors, with nearly 60 initial coin offerings (ICOs) closed in the quarter for more than $750 million, and it looks like this is just the beginning. It seems that blockchain is about to have an impact on nearly every industry. While banking, finance and real estate are the so-called usual suspects by being ahead of the curve, even industries like education, social media and security are being disrupted by blockchain-powered…

Read More Read More

HBO social media hacked in latest cyber security breach

HBO social media hacked in latest cyber security breach

HBO’s Facebook and Twitter accounts have been compromised in the latest cyber security breach to hit the firm. A group called OurMine appeared to take control of the main HBO accounts, as well as those for the network’s shows including Game of Thrones. One posts said “OurMine are here. we are just testing your security”. It is the latest cyber security headache for the entertainment firm after hackers released Game of Thrones scripts and company data. Source: BBC Read the…

Read More Read More

Invisible Man malware lifts banking credentials by abusing Android accessibility services

Invisible Man malware lifts banking credentials by abusing Android accessibility services

A family of malware known as “Invisible Man” abuses Android OS accessibility services in order to steal users’ banking credentials. Invisible Man, also known as “Svpeng”, has earned quite a reputation for itself in the past few years. It was one of the first trojans to attack SMS-based banking and to steal users’ credentials via phishing overlays. Such novelty garnered attention for the malware among computer criminal circles… as well as Russian law enforcement. Once again, the threat is up…

Read More Read More