Alison Partners with CODERED

Alison Partners with CODERED

Cybersecurity course publisher CODERED has formed a partnership with one of the world’s largest fee-free online learning platforms. The publishing partnership between CODERED and Alison.com was announced earlier today. The first educational fruit to be born from this union is a certified online course titled Hands-On Android Security that takes approximately four to five hours to complete. Students of the course will become acquainted with the core concepts of the Android operating system, hardware security components, and native applications. Users will…

Read More

FBI, Secret Service investigating cyberattack on Florida water treatment plant

FBI, Secret Service investigating cyberattack on Florida water treatment plant

Local officials said someone took over their TeamViewer system and dangerously increased the levels of lye in the town’s water. Image: Getty Images/iStockphoto Federal law enforcement is now looking into a cyberattack at a water treatment plant in Oldsmar, FL where someone was able to remotely access systems and add a dangerous amount of chemicals to the town’s water supply. On Monday, Pinellas County Sheriff Bob Gualtieri explained during a press conference that an employee…

Read More

DHS and partners coordinated to secure Super Bowl LV

DHS and partners coordinated to secure Super Bowl LV

DHS and partners coordinated to secure Super Bowl LV | 2021-02-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

5 minutes with Sarah Tatsis – Why women are needed in the ongoing fight against cybercriminals

5 minutes with Sarah Tatsis – Why women are needed in the ongoing fight against cybercriminals

5 minutes with Sarah Tatsis – Why women are needed in the ongoing fight against cybercriminals | 2021-02-09 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated…

Read More

3.2billion records leaked, Part II

3.2billion records leaked, Part II

The Largest compilation of emails and passwords (COMB), more than 3.2 billion login credentials, has been leaked on a popular hacking forum. More than 3.2 billion unique pairs of cleartext emails and passwords have been leaked on a popular hacking forum, the collection aggregates data from past leaks, such as Netflix, LinkedIn, Exploit.in, Bitcoin, and more. This breach was dubbed “Compilation of Many Breaches” (COMB), the data is archived in an encrypted, password-protected container. Source:…

Read More

How to select an enterprise VPN that protects data but doesn’t drive users crazy

How to select an enterprise VPN that protects data but doesn’t drive users crazy

IT teams should look for services with automatic alerts about user behavior, logging, scalability, and central management. Image: Getty Images/iStockphoto As remote work becomes the new normal, IT teams have to take a second look at solutions that worked in March 2020 but may not be the right choice now. In addition to implementing multifactor authentication and considering a zero-trust approach, IT leaders should determine how a virtual private network (VPN) fits into the overall…

Read More

Data loss, credential compromise up in phishing attacks in 2020, says vendor report | IT World Canada News

Data loss, credential compromise up in phishing attacks in 2020, says vendor report | IT World Canada News

Phishing continues to be an effective way for threat actors to infect computing devices, according to a survey from cybersecurity vendor Proofpoint. Fifty-seven per cent of the 600 infosec professionals in seven countries questioned said their firm suffered a successful phishing attack last year, the company said Monday in releasing its annual State of the Phish Report. That was up slightly over last year, suggesting the percentage of successful attacks stayed the same. However, 60…

Read More

A guide to cyber security for marketing agencies – IT Governance UK Blog

A guide to cyber security for marketing agencies – IT Governance UK Blog

If your marketing agency is under the impression that cyber security is strictly an IT issue, you should think again. Effective security is a company-wide commitment, and marketers play one of the most crucial roles. Consider how much personal data you collect; if that information is lost or stolen, it will severely damage your customer relationships. In fact, a Ping Identity survey found that 78% of people would stop using an organisation’s online services if…

Read More

Experts Warn of “Beg Bounty” Extortion Attempts

Experts Warn of “Beg Bounty” Extortion Attempts

Sophos has warned businesses to be on the lookout for unsolicited and often generic emails attempting to extract a bug bounty from them with borderline extortion tactics. So-called “beg bounty” messages typically involve automated scanning for basic misconfigurations or vulnerabilities, followed by a cut-and-paste of the results into a pre-defined email template, explained Sophos principal research scientist, Chester Wisniewski. Small businesses are typical targets: even though they do not have a bug bounty program, and…

Read More
1 2,551 2,552 2,553 2,554 2,555 2,691