Cybersecurity acronyms you should know

Photo by cottonbro on Pexels.com Cybersecurity news and best practices are full of acronyms and abbreviations. Without understanding what each one means, it’s difficult to comprehend the significance of most major threats and the essential tools that help prevent them. Our list below contains 100 of the most common cybersecurity abbreviations that you may encounter in … Continue reading Cybersecurity acronyms you should know

Biden: Hackers targeting ill-prepared local governments

President Joe Biden on March 21, 2022, warned that Russian cyberattacks on U.S. targets are likely, though the government has not identified a specific threat. Biden urged the private sector: "Harden your cyber defenses immediately." It is a costly fact of modern life that organizations from pipelines and shipping companies to hospitals and any number of private companies are vulnerable … Continue reading Biden: Hackers targeting ill-prepared local governments

US: Russians have hacked American military-industrial complex

Man without identity programing in technology enviroment with cyber icons and symbols Russian government-backed hackers have been stealing "sensitive" information from American weapons companies for several years, a recent announcement by US security agencies has claimed. The purported cyber attacks are said to date back at least two years, RF.com reports. The FBI, National Security … Continue reading US: Russians have hacked American military-industrial complex

US charges two suspected hackers over ransomware attacks

The Biden administration has charged two suspected hackers, nationals of Russia and Ukraine, respectively, in connection with a wave of ransomware attacks that targeted US companies earlier this year. The United States Justice Department announced the charges on Monday, saying it recovered $6.1m in ransom payments made to one of the suspects. Attorney General Merrick Garland Yaroslav … Continue reading US charges two suspected hackers over ransomware attacks

Cybersecurity: What you should know about ‘info stealers’ and online security

The term info stealer is self-explanatory. This type of malware resides in an infected computer and gathers data in order to send it to the attacker. Typical targets are credentials used in online banking services, social media sites, emails, or FTP accounts. Info stealers may use many methods of data acquisition. The most common are: hooking browsers … Continue reading Cybersecurity: What you should know about ‘info stealers’ and online security

White House Cybersecurity Conference: U.S. technology company executives worried about data privacy

The White House gathered leading U.S. technology company executives this week to discuss cybersecurity, after a series of high-profile hacking incidents earlier this year, according to Reuters. Photo by Tima Miroshnichenko on Pexels.com The guest list included Amazon CEO Andy Jassy, Apple CEO Tim Cook, Microsoft CEO Satya Nadella, Google CEO Sundar Pichai, and IBM Chief … Continue reading White House Cybersecurity Conference: U.S. technology company executives worried about data privacy

cybercriminals

How cybercriminals are gaining from COVID-19 charities

New Digital Shadows research takes a look at how cybercriminals may be profiting from COVID-19 charities. The Digital Shadows Photon Research Team revealed that in late March, a user on the prestigious Russian-language cybercriminal forum XSS initiated an English-language thread to share free credentials for accounts with preloaded funds for the automated vending cart (AVC) sites Joker's … Continue reading How cybercriminals are gaining from COVID-19 charities

criminal

Tips on preparing for and managing Ransomware Attacks

IBM X-Force Incident Response and Intelligence Services (IRIS) offers the following recommendations for organizations, cities, government entities, and beyond on how they can prepare for ransomware attacks: Rehearse and Test Your Incident Response: It's not a matter of if an incident response plan will be tested anymore, but a matter of when. Create a detailed incident response plan and … Continue reading Tips on preparing for and managing Ransomware Attacks

cybercriminals

US taxpayers protest paying hackers in ransomware attacks with public funds

Security announced results of a new study that explores taxpayers' point-of-view on ransomware in the wake of growing attacks against cities. The survey, conducted by Morning Consult on behalf of IBM, highlights that nearly 80% of citizens surveyed across the United States are increasingly worried about ransomware attacks on cities - yet more than half are still … Continue reading US taxpayers protest paying hackers in ransomware attacks with public funds

artificial intelligence 2020

Top cybersecurity trends you shouldn’t miss in 2020

What are the top seven cybersecurity trends to be aware of in 2020? TÜV Rheinland  released its seventh annual report on Cybersecurity Trends for 2020. The report is a collaboration between many cybersecurity experts globally, and discusses seven key cybersecurity trends which will be important to be aware of in 2020. These include attacks on smart supply chains, … Continue reading Top cybersecurity trends you shouldn’t miss in 2020

Scam image posted on Meziesblog by Irobiko Chimezie Kingsley

What you need to know about information security and cybersecurity

Both the terms, cybersecurity and information security, are associated with the security of computer systems and are often used as synonyms. For those who are not aware of the difference — the definition and understanding of the terms vary a lot and should not be interchangeable as it is done often. Putting it in a … Continue reading What you need to know about information security and cybersecurity

Cybersecurity challenges in the British education system

Student Loans Company suffered just shy of a million attempted cyberattacks in the last fiscal year. The organisation says that “malicious online activity affects every organisation” and that 99.9% of the recorded attempts in 2017/18 presented an “extremely low level of threat”. The comments, made by an SLC spokesperson during an interview with IT Pro, may … Continue reading Cybersecurity challenges in the British education system

We will not harm any nation or individual – HUAWEI

Chinese tech giant Huawei is facing a growing backlash overseas, and increased scrutiny of the company is hampering its efforts to dominate emerging fifth-generation network markets. Over the past few weeks, Huawei has faced a landslide of allegations, all of which it has denied. The company’s chief financial officer, Meng Wanzhou, has been released on … Continue reading We will not harm any nation or individual – HUAWEI

Facebook enmeshed in a new software hack

  In yet another data breach, Facebook has revealed that a software bug caused photos of millions of its users being exposed. According to the world's largest social media network, over 12 days in the month of September, several third-party applications gained access to "broader set of photos than usual." Facebook said that the bug … Continue reading Facebook enmeshed in a new software hack

Chinese government arrests a Tibetan Monk on terrorism charges

A Tibetan monk was detained this month in Qinghai on suspicion of sharing politically sensitive content on social media and is being held at an undisclosed location with his current condition unknown, according to a Tibetan human rights group in India. Image: Woechung Gyatso Woechung Gyatso, a monk at the Tsang monastery in the Tsolho Tibetan … Continue reading Chinese government arrests a Tibetan Monk on terrorism charges