The data exchange between the EU and the US may still not be legally secure, even after agreeing on the EU US Privacy Shield. The EU will decide next week whether the agreement adequately takes into account the privacy rights of EU citizens. An executive order by President Trump in January 2017 initially caused concern that …
Cyber criminals are aggressively sharing credentials to .edu e-mail accounts – including stolen accounts, fake e-mails, and older e-mail accounts. The Digital Citizens Alliance saw evidence showing threat actors of all types – including hacktivists, scam artists, and terrorists – putting credentials (e-mails and passwords) up for sale, trade, or, in some cases, just given …
Google and Symantec are engaged in a war about each other’s security practices, with all of us caught in the crossfire. As TechCrunch reports, Google believes that Symantec has been improperly issuing security certificates for tens of thousands of websites. If the search engine follows through with its threat, then Chrome will soon no longer …
A recent survey has once again highlighted the urgent need for UK business to take cyber security more seriously. The survey, by Ultima, found that 65 per cent of companies don’t have any security solutions deployed onto their mobile devices, and 68 per cent of companies do not have an awareness programme aimed at employees …
The Federal Bureau of Investigation FBI issued a warning that cyber criminals are actively targeting File Transfer Protocol (FTP) servers operating in “anonymous” mode and associated with medical and dental facilities to access protected health information (PHI). The federal agency said in a release that cyber criminals are targeting FTP servers to access PHI as …
US Senate voted to eliminate privacy rules that would have forced ISPs to get your consent before selling Web browsing history and app usage history to advertisers. Within a week, the House of Representatives could follow suit, and the rules approved by the Federal Communications Commission last year would be eliminated by Congress. So what has changed for …
The IBM X-Force Threat Intelligence team a vital aspect revealed in its 2017 Threat Intelligence Index that, spam levels increased, launching innumerable fresh malware-laced attachments consisting of ransomware and banking Trojans. Networkworld.com posted this, March 13, 2017. Newer gTLDs, such as .click .top and .xyz, are now accounting for 5, 4 and 3 percent of …
The U.S. Justice Department has unsealed indictments against four men accused of hacking into a half-billion Yahoo email accounts. Two of the men named in the indictments worked for a unit of the Russian Federal Security Service (FSB) that serves as the FBI’s point of contact in Moscow on cybercrime cases. Here’s a look at the …
Private and public sector organizations share a common goal in hosting Internet websites: making sure that connections with customers and citizens are secure. Google and Mozilla, for example, are among many entities promoting Internet security via the adoption of Hyper Text Transfer Protocol Secure technology, or HTTPS, versus the basic and less secure HTTP technology …
Samas RansomWorm, a ransomware variant is infiltrating unsuspecting machines, gaining its name from its unusual propagation characteristics. Whereas traditional ransomware only encrypts the machine the attacker is controlling, RansomWorm propagates inside throughout the entire network to encrypt every server and computer—and the backups. According to research from Javelin Networks, it executes what it calls the …