Cyber Security is at its highest alert levels as the holiday shopping soars to a feverish pitch — the crooks are harvesting tens of millions of dollars a day just on shopper’s gullibility! BEWARE of all the warning signals — spread and share the alert graphics we sent and posted last week. The crooks are out there, and they are gonna get you if you let them! The Cyber Security InfoManager can lead a horse to water . . . but . . . .
- Is China’s new cyber security law a threat to international businesses?
- Following Trump’s win, new users of encrypted email services double
- Wisconsin Recount: The Alex Halderman Affidavit on Russian Hacking
- PwC reveals a disturbing 656pc increase in cybersecurity incidents
- Obama: We Won’t Fight Back Against Russian/Chinese Cyberwarfare
- DoD, Army Ramp Up Cybersecurity Measures With New Initiatives
- Cybercriminals Spread Malware Using Microsoft’s OneDrive
- Facebook at risk, Dare you login before you read this!
- State wants rules to toughen utilities’ cybersecurity
- Trump Presidency: Where does cyber security go now?
- Not Just Cameras, Headphones Can Be Hacked To Spy
- Threats to Look Out for this Holiday Season
- Three Essential Cybersecurity Questions
- Cybersecurity — Have you been pwned?
ALERT Be very careful what you click! Many of the sites listed below employ stalker links! LOOK FOR the Firefox ‘READER’ icon in the address window to read the articles without the risks! (More here)
Trump Presidency: Where does cyber security go now?
Given the unexpected results of the US election, it is hard to predict the future, particularly in sorting out campaign rhetoric from policy intent.
Changes will be made to cyber security – this is nearly certain. The election itself was highly charged with security issues that created at the very least tension, and at its height, a kind of hysteria.
Kasey Cross itproportal.com
Following Trump’s win, new users of encrypted email services double
Thanks to Del Missier for sending this one in . . .
Donald Trump’s election as the 45th President of the United States seems to have a few people worried. We’ve all heard about the Immigration Canada website crashing and flocks of protesters lining the streets, but a less well known story has just emerged regarding a massive uptake in new subscribers to encrypted email services since the election result.
DoD, Army Ramp Up Cybersecurity Measures With New Initiatives
The Hack the Pentagon pilot was the first bug bounty in the history of the federal government, officials said.
Using vetted hackers, DoD used a similar method to that of commercial-sector crowdsourcing, which identifies security vulnerabilities in DoD’s systems. ”Hack the Pentagon” was modeled after similar competitions conducted by some of the nation’s biggest companies to improve the security and delivery of networks, products, and digital services, according to officials.
Carter Announces ‘Hack the Pentagon’ Program Results
Video : https://youtu.be/qXsliwuPMxE
Facebook at risk, Dare you login before you read this!
Next time you log in to your Facebook messenger, you could be the the victim of ransomware. You might be confused what this ransomware is? Well it is a kind of virus that infects your computer and put all your saved files at the stake, then its makers will demand you a Ransom amount for the recovery. They may ask you any amount and you will be helpless to pay.
There’s already a warning released about a ransomware attack that is being stealthily stuffed through Facebook Messenger. It is done through a Scalable Vector Graphic (SVG) image file which will take you to a fake YouTube site. This fake site prompts the you to install a Chrome extension that is a malware downloader called Necumod, which would be used to download the Locky ransomware.
Threats to Look Out for this Holiday Season
As throngs of discerning shoppers flock to the high street and online shopping carts are filled to the brim, cybercriminals are busy preparing their wares to take advantage of the high sales period.
With this in mind, we decided to outline some of the biggest threats facing both retailers and consumers in the upcoming holiday season
Chris Brown – American Security Today
Wisconsin Recount: The Alex Halderman Affidavit on Russian Hacking
The recount in Wisconsin, should it occur, is already causing plenty of heartburn in the press.
Jill Stein has called for it and raised plenty of money in so doing. More to the point, Stein attended a dinner last winter where she was a guest of Vladimir Putin, and it has long been thought that Russia’s aim in hacking the election was to sow chaos even more than it was to elect Donald Trump.
Three Essential Cybersecurity Questions
Amid all of the hullabaloo over the presidential election this year, one topic has quietly grabbed nearly just as many headlines—cybersecurity.
With the continued growth of global e-commerce and electronically available consumer data, many businesses have become targets for cybersecurity attacks. Consider, for example, just a few of the companies who’ve acknowledged data breaches this year
State wants rules to toughen utilities’ cybersecurity
Michigan regulators have directed their staff to develop rules designed to toughen utilities’ defenses against cyberattacks.Michigan Public Service Commission Chairwoman Sally Talberg says natural gas and electric providers face attempted intrusions into their computer system on an almost daily basis.
She says federal and state governments need to work with utilities to create programs to deal with security issues.The rules to be crafted will require utilities to annually give regulators an overview of their cybersecurity program, staffing numbers, a description of employee training and other information such as a summary of cybersecurity incidents.The Public Service Commission issued the order earlier this week.
Cybersecurity — Have you been pwned?
“Pwn” is an internet slang term that means “to own” or “to dominate.” Your teenage kids most likely know this because it is used extensively in multiplayer video games.
Not surprising, the term has grown favor with hackers who use it to describe a state in which they have taken or stolen the privacy of their victim. I will give you a few tools to help determine if you have been “pwned” and what steps to take to offset the data loss.
Tim Leonard, Commercial Bank, Texas.
Not Just Cameras, Headphones Can Be Hacked To Spy
Recently, some researchers found out that an output device such as a speaker or headphone can be hacked. This has led to the need to strengthen cyber security.
Wired reported that a group of researchers from Israel’s Ben-Gurion University of the Negev have demonstrated how hackers turn non-powered speakers and normal headphones into microphones. They used a proof-of-concept malware to prove it how they can hack even the simplest devices and surpassing cyber security.
Game & Guide
PwC reveals a disturbing 656pc increase in cybersecurity incidents
There has been a frightening 656pc increase in cybersecurity incidents involving industrial control systems since 2010, PwC has revealed in its latest ‘megatrend’ forecasts.
In a new report, Five Megatrends and their Implications for Global Defence and Security, PwC highlights major challenges that lie ahead. These megatrends include shifts in global economic power, demographic shifts, accelerating urbanisation and the rise of ‘megaslums’ and feral cities, the rise of technology and most frightening of all, climate change and resource scarcity.
The report : DocumentAssets/456045.pdf
John Kennedy — siliconrepublic.com
Is China’s new cyber security law a threat to international businesses?
‘Despite the challenging dilemma, companies are likely to comply and give in to China’s demands’ China has the world’s largest market for digital shopping, mobile payments, and Internet-enabled financial services. Close to 400 million people do most of their payments using their smartphones.
That’s why its new cyber security law – due to take effect in June of next year – is particularly alarming. It is part of an ongoing government programme to reinforce China’s cyber security, and arguably targets non-Chinese hackers.
Ben Rossi — information-age.com
Cybercriminals Spread Malware Using Microsoft’s OneDrive
Cybercriminals are always seeking new ways to convince their victims to load websites or download malicious files, and this time they have turned to Microsoft services to make links look legitimate.
Security company Forcepoint has discovered a new wave of attacks involving Microsoft’s OneDrive for Business, with cybercriminals hosting malware on Redmond’s service and then attaching links to emails sent to victims.
Obama: We Won’t Fight Back Against Russian/Chinese Cyberwarfare
Of course we won’t fight back. That would be mean.
Instead we’ll roll over with our legs in the air and play dead. Then Obama will give a lecture that some foreign leader will smirk through and then sign a worthless foreign accord with them. Because Munich is now a weekly event.
Daniel Greenfield — frontpagemag.com