Tech content trusted by users in North America and around the world
6,627 Reviews & Articles | 45,142 News Posts

TweakTown News

Refine News by Category:

Hacking & Security Posts - Page 11

Report: Need better breach crisis? IT manager may not be best bet

Companies must have a strategy in place when a data breach occurs, and it looks like IT managers may not be best to handle a breach crisis, according to a new report by Booz Allen Hamilton. Instead, a business savvy leader at the company is better prepared to handle the problem, as they will be prepared to address crisis communications, legal issues, disaster recovery, and other strategic decisions that must be made.

 

report-need-better-breach-crisis-manager-best-bet_01

 

A skilled executive that has a high-level view of the company's complete operation will be able to react more efficiently instead of an IT or security manager.

 

"They may have to shut the systems down, reconfigure things, and do other things that will affect the business," said Bill Stewart, executive vice president of Booz Allen Hamilton, in a statement published by CSO Online. "And they might not be in a situation where they understand the broader business objectives. Having someone who understands the broader business, helps them make better decisions."

Continue reading 'Report: Need better breach crisis? IT manager may not be best bet' (full post)

The race is on to help develop cybersecurity for Internet of Things

There are more than 16 billion connected computing devices in use across the world today, with even more Things expected to utilize the Internet of Things (IoT) in the future.

 

race-help-develop-cybersecurity-internet-things_01

 

Cybersecurity experts are concerned about a large number of threats, with 83 percent worried about rogue or unauthorized devices operating undetected in their networks, according to a recent survey by Pwnie Express. To make matters even worse, 69 percent of cybersecurity professionals cannot access full wireless visibility of devices, so it's difficult to identify what is actually connected.

 

As more companies and users embrace IoT, there is concern that the Internet of Evil Things (IoET) will find countless vulnerabilities to exploit in the future.

Continue reading 'The race is on to help develop cybersecurity for Internet of Things' (full post)

Cheetah Mobile: 99% of Android phone users faced a potential threat

A whopping 99 percent of Google Android phone owners faced a potential threat from cybersecurity loopholes, according to the Cheetah Mobile 2014 Mobile Security Report.

 

cheetah-mobile-99-android-phone-users-faced-potential-threat_01

 

Mobile users faced a number of different phishing scams, malware attacks, and data leaks in 2014 - and social network phishing is evolving, posing even more threats that users should be aware of.

 

Android, the most popular mobile operating system, has been applauded for its open source ecosystem - which also gives cybercriminals the ability to easily create malicious tools. Cybersecurity experts recommend running an anti-malware scanner, at the very least, to help identify potential threats that could be avoided.

Report: Better cybersecurity, safety standards needed for patient data

Cybercriminals find healthcare data to be an appealing target, as medical records contain a large amount of personal information. There is a drastic need for better cybersecurity protocols - and how hospitals and other medical agencies handle paper and electronic records.

 

report-better-cybersecurity-safety-standards-needed-patient-data_01

 

Thirty four percent of reported medical data breaches over the past three years took place in California, Florida, Texas, New York and Illinois - with a mix of healthcare system partners, insurers, and other third parties helping contribute to the problem.

 

"News of hacking incidents and cybersecurity [breaches] have been in the news so much lately, [that] both for industries inside and outside healthcare, one might get the impression that hacking is the most common reason for data breaches," said Dr. Vincent Liu, from the division of research for Kaiser Permanente, in a statement to Medpage Today. "In fact, we found that theft of paper or electronic records accounted for the majority - protecting the security and privacy of patient data needs to be a priority in many different venues, and with all types of patient data, including paper records."

Cryptzone: Insider threats still pose biggest threat to companies

Insider threats remain a significant threat to corporations, causing the most actual damage and harm, according to a recent survey published by the Cryptzone cybersecurity firm.

 

cryptzone-insider-threats-still-pose-biggest-threat-companies_01

 

"It's remarkable that many organizations are still utilizing network security technologies developed in the nineties - a time when the Internet was still in its infancy," said Kurt Mueffelmann, president and CEO of Cryptzone. "The cyberattacks we have seen over the last few years have demonstrated that it's far too easy for hackers to steal user credentials, and then use those credentials to traverse the enterprise network in search of the most valuable data."

 

Forty-eight percent of respondents said IT departments are main controllers related to cybersecurity policy, 36 percent said information security owns policy control, and 12 percent noted compliance or risk management teams are responsible for security policies.

Continue reading 'Cryptzone: Insider threats still pose biggest threat to companies' (full post)

Expert: Cyberattacks on nuclear power plants could be next 9/11

Cybercriminals are finding security vulnerabilities that allow them to target critical infrastructure like electric grids, and could also begin targeting nuclear power plants, according to a cybersecurity specialist in Israel.

 

expert-cyberattacks-nuclear-power-plants-next-9-11_01

 

"The disruption and possible infiltration of critical infrastructure is the most severe form of cyberattack," said Col. Dr. Gabi Siboni, director of the cyber security program at the Institute for National Security Studies program, in a statement to the Jerusalem Post. "Such attacks on airplanes or air traffic control towers, for instance, means that hackers could cause accidents, or even paralyze entire flight systems. As of now, this area of capabilities is the exclusive domain of developed states."

 

The United States, UK, Israel, South Korea, and other nations have expressed concern related to critical infrastructure cybersecurity. Recently, South Korea - which has blamed North Korea - suffered a breach at its national nuclear plant operator, though quickly confirmed its 23 atomic reactors weren't at risk.

Continue reading 'Expert: Cyberattacks on nuclear power plants could be next 9/11' (full post)

SentryBay shows off anti-keylogging solution for mobile users

Enterprise security company SentryBay has unveiled a new anti-keylogging solution designed for smartphones, tablets, and other mobile products. To help keep mobile users secure, the product generates a dedicated secure keyboard, keystroke encryption, screen capture protection, and the generation of fake random characters.

 

sentrybay-shows-anti-keylogging-solution-mobile-users_01

 

Both Google Android and Apple iOS cache user keypad entries, providing savvy hackers with the ability to monitor and uplift what is entered.

 

"We are pleased to announce these latest innovations," said Dave Waterson, CEO of SentryBay. "For a long time we have been a leader in PC-based anti-keylogging technology, but after years of R&D we finally feel the solution we have developed for mobile can provide the strong data entry security that app developers are looking for."

Continue reading 'SentryBay shows off anti-keylogging solution for mobile users' (full post)

Cybersecurity in full display during RSA Conference in San Francisco

Cybersecurity experts from around the world will descend on the Moscone Center in San Francisco for RSA Conference 2015 this week. The growing security industry is expected to be worth up to $20 billion within the next three years, as the US government and private sector companies purchase new software and hardware.

 

cybersecurity-full-display-during-rsa-conference-san-francisco_01

 

"Seven or eight years ago you could hear a pin drop at RSA," said Dan Ives, analyst at FBR Capital Markets, in a statement to FT. "Now it is going to be like a Bon Jovi concert. It is the seminal event in cybersecurity: the new year's eve, the wedding, the bar mitzvah."

 

A number of high-profile security incidents in 2013, 2014 and so far in 2015 have shown the need for next-generation cybersecurity solutions. More than $1 billion in venture capitalist funds have been invested in cybersecurity during Q1 2015 alone - and it appears more investors are preparing to flock to the market.

Continue reading 'Cybersecurity in full display during RSA Conference in San Francisco' (full post)

Cyber officials concerned of limited US network defense

US lawmakers and military officials are worried that their cyber abilities are still not advanced enough, especially in regards to cybersecurity, and want to increase efforts to recruit cyber warriors. The top Pentagon cyber official, Eric Rosenbach, confirmed he is concerned that the Cyber Command doesn't have a strong command and control platform that can launch strong offensive cyber weapons.

 

cyber-officials-concerned-limited-network-defense_01

 

"Today I think we are, we could be, an easy target," said Air Force Lt. Gen. James McLaughlin, deputy commander of the US Cyber Command, in a recent statement to Capitol Hill.

 

The US military wants to create a group of 6,200 'cyber warriors' by the end of next year, working in 133 operational teams. Along with increasing manpower, US military leaders want to invest in new hardware and software that will give it an advantage against foreign governments.

Study: Iran increasing cyberattacks, developing new cyber arsenal

The Iranian government has a growing cyber arsenal capable of launching more attacks against political rivals and foreign governments, according to the Norse cybersecurity firm and the American Enterprise Institute. Even with international sanctions, the country has been able to create tools used for reconnaissance and intelligence collection from compromised targets.

 

study-iran-increasing-cyberattacks-developing-new-cyber-arsenal_01

 

"Cyber gives them a usable weapon, in ways nuclear technology does not," said Frederick Kagan, director of the American Enterprise Institute's Critical Threats Project, in a statement published by the New York Times. "And it has a degree of plausible deniability that is attractive to many countries."

 

There is concern that Iran would spend even more money to help develop its cyberweapons - but the country has already continually improved its current attack capabilities. China and Russia have developed capable cyberattack efforts, but cybersecurity experts show the most concern that North Korea and Iran are trying to improve their hacking tools.

Latest News Posts

View More News Posts

Forum Activity

View More Forum Posts

Press Releases

View More Press Releases
Subscribe to our Newsletter
Or Scroll Down