Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Police Warn of New ‘Line-Trapping Technology’ Being Used to Scam People Over the Phone

From CyberHeist News

A new piece of sophisticated technology is being used by fraudsters to scam unsuspecting people over the phone. Police said a woman in the York Region received a call earlier this month and was told by the scammers she had been a victim of identity ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


The FBI Says Your TV Is Probably Spying On You

Last week, the FBI, that bastion of sage privacy and security advice, issued a blog post out of its Portland field office warning cyber Monday shoppers that their smart TV is a little too smart, and likely watches you as much as you watch it. ...

Continue Reading →
0

Tim Berners-Lee’s 9 Principles for the Internet

Tim Berners-Lee, the man who gave us the World Wide Web protocol in 1989, and turned the Arpanet into a global communications network of unprecedented scale, is worried about the health of the Internet.

Governments are using the Internet for mass surveillance, and big Internet companies and merchants collect, analyze, buy, and sell more personal data about each of us. Internet trolls and other bad actors use the Internet for criminal ...

Continue Reading →
1

Russia Creates A National Internet

Back on March 1 2019, I reported that Russia was planning to disconnect itself from the Internet.  On November 1, 2019, the Russian Federation decreed that all Russian ISPs are required to route Internet traffic through special gateway routers run by Russian communications regulator Roskomnadzo.

The stated goal is to protect Russia from major cyber-attacks from bad actors or other nation-state run cyber ...

Continue Reading →
1

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


End of an Era – Microsoft is Ending Support for Windows 7 and Windows Server 2008 R2

Original release date: October 17, 2019

Personal note:  Windows 7 has been, and may always be, my favorite operating system of all time.  I have come to respect Windows 10, and of course I use it every day, but I ...

Continue Reading →
0

Guest Post – Can Crime Really Affect a Business’ Long-Term Growth Projections?

A guest post by Maxwell Donovan

Editor’s comment: I spend a lot of time writing about cyber-crime.  This article reminds us that there are other very physical and personal crimes that we need to guard against as well.

They say that crime doesn’t pay, but in the end, does it? You are at risk from crime when you’re running a business. This could include ...

Continue Reading →
0

When Penetration Testing Goes Wrong

When I am speaking or training, and the subject turns to penetration testing, I make certain to explain to the class or audience that nearly everything a pen-tester does violates federal laws.  For starters, there is the Computer Fraud and Abuse Act.  There are many other computer laws at both the federal and state levels.

Penetration testing takes a vulnerability assessment to the ...

Continue Reading →
2

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


U.S. Cyber Command Shares 11 New Malware Samples

Original release date: September 8, 2019

U.S. Cyber Command has released 11 malware samples to the malware aggregation tool and repository, VirusTotal. The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review U.S. Cyber Command’s VirusTotal page to view the samples. CISA ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Potential Hurricane Dorian Cyber Scams

Original release date: September 4, 2019

The Cybersecurity and Infrastructure Security Agency (CISA) warns users to remain vigilant for malicious cyber activity targeting Hurricane Dorian disaster victims and potential donors. Fraudulent emails commonly appear after major natural disasters and often contain links or attachments that direct users to malicious websites. Users should ...

Continue Reading →
0
Page 4 of 16 «...23456...»