#DEFCON: A Bad eBook Can Take Over Your Kindle (or Worse)

#DEFCON: A Bad eBook Can Take Over Your Kindle (or Worse)

Amazon’s Kindle e-reader is a popular device that has been on the market since 2007, with approximately 100 million Kindles in use around the world today. The primary purpose of the Kindle is to enable users to read books. Slava Makkaveev, security researcher at Check Point Software Technologies, had another idea, though; he wanted to see if he could load a book that would exploit the Kindle. At the DEF CON 29 conference, Makkaveev outlined…

Read More

Disney Employees Among Those Arrested in Child Abuse Sting

Disney Employees Among Those Arrested in Child Abuse Sting

Three Disney theme park employees have been arrested in Florida as part of an undercover sting operation to catch sexual predators who target children via the internet. The suspects are among 17 individuals arrested by the Polk County Sheriff’s Office (PCSO) under the Operation Child Protector initiative. The initiative was a joint effort involving detectives from the Auburndale Police Department, Orlando Police Department, Winter Haven Police Department, and Orange County Sheriff’s Office. From July 27…

Read More

Data Breach at University of Kentucky

Data Breach at University of Kentucky

A data breach at the University of Kentucky has exposed the personal information of hundreds of thousands of students and staff. An annual cybersecurity inspection uncovered the breach, which was caused by a vulnerability in a server associated with the university’s College of Education database.  News source WDRB reported that more than 355,000 email addresses were exposed in the security incident, with victims located across the world.  “The database is part of a free resource program known as the Digital…

Read More

US Imprisons Drone Whistleblower

US Imprisons Drone Whistleblower

An intelligence analyst who illegally obtained classified US government documents on drone warfare and leaked them to a journalist has been sentenced to prison. Daniel Everette Hale met the reporter in April 2013 while attending an event in a bookstore in Washington DC.  In 2014, while working as a cleared defense contractor at the National Geospatial-Intelligence Agency (NGA), Hale printed six classified documents, all of which were later published by a news outlet. Hale later printed 36…

Read More

White House Executive Order – Improving Detection of Cybersecurity Vulnerabilities | McAfee Blogs

White House Executive Order – Improving Detection of Cybersecurity Vulnerabilities | McAfee Blogs

This is the third in a series of blogs on the Cybersecurity EO, and I encourage you to read those you may have missed. (Part 1, Part 2). Between the initial publication of the Executive Order (EO) for Improving the Nation’s Cybersecurity on May 12 and late July, a flurry of activity by departments and agencies continues to occur on how best to understand and address potential security gaps. Once identified, these analyses will facilitate…

Read More

Make communications one of your top priorities – Cisco Blogs

Make communications one of your top priorities – Cisco Blogs

There is no question that 2020 was an interesting year from a variety of perspectives. But what clearly stands out to me is the fact that it created an arena for a completely digital experience to be embraced. Without warning, we found ourselves having daily meetings on Webex, relying on social media to keep up with the latest news and ordering online more than ever before; among other examples. In this new setting, with information…

Read More

Cybersecurity experts in Luxembourg earn the highest salaries and more data on cyber jobs around the world

Cybersecurity experts in Luxembourg earn the highest salaries and more data on cyber jobs around the world

Cybersecurity experts in Luxembourg earn the highest salaries and more data on cyber jobs around the world | 2021-08-06 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our…

Read More

Amazon Kindle flaws could have allowed attackers to control the device

Amazon Kindle flaws could have allowed attackers to control the device

Now patched by Amazon, security vulnerabilities found by Check Point would have given attackers access to a Kindle device and its stored data. Image: Amazon Amazon Kindle owners could have exposed themselves to a remote control attack simply by opening the wrong e-book. In a report published on Friday, cybersecurity provider Check Point said that it discovered security holes in the Kindle that would have helped a cybercriminal take full control of the device, potentially…

Read More

Phishing continues to target big businesses and exploit COVID-19 fears in Q2 2021

Phishing continues to target big businesses and exploit COVID-19 fears in Q2 2021

Spam as a share of global mail traffic rose, and attackers have started to adapt their scams to other languages to reach wider audiences. Image: Vladimir Obradovic, Getty Images/iStockphoto Despite a rise in global spam numbers, adoption of new languages by phishing attackers, new scam types and a shift in the most commonly impersonated business type to phish people, Kaspersky’s Q2 2021 quarterly spam report is described by its authors as “not delivering any surprises.” …

Read More

Revolutionizing Customer Engagement and Collaborative Development – Cisco Blogs

Revolutionizing Customer Engagement and Collaborative Development – Cisco Blogs

Our customers are looking for ways to simplify management of their Cisco devices and adopt new technologies faster while maintaining strong security across their environment. They are facing challenges in locating the right information necessary for deployment, obtaining access to the right resources, gaining visibility into their assets as well as more automated capabilities to reduce risks, increase uptime, and optimize overall performance. Cisco CX Cloud was built to address these concerns, alongside the Success…

Read More
1 3,259 3,260 3,261 3,262 3,263 3,634