Archive for the ‘cybercrime/malcode’ category: Page 205
Feb 25, 2016
Cybercrime warrior: Symantec’s Michael Brown
Posted by Karen Hurst in categories: business, cybercrime/malcode, internet
80 million cyber attacks per year — 400 every minute — but as many as 70 percent of them go undetected. And, these numbers are anticipated to go drastically higher now “Ransomware” is paying off for hackers.
Using the internet is a risk most businesses and individuals take for granted. But as more data is stored online, the world is becoming ever more vulnerable, the head of global internet security firm Symantec, Michael Brown, says.
Feb 25, 2016
Need To Beef Up India’s Cyber Security Policies And Mechanisms – Analysis
Posted by Karen Hurst in categories: cybercrime/malcode, finance, government, policy, robotics/AI
I luv it — India get’s it. You have to make sure that your IT foundation is solid first before unleashing things like AI. Connected AI requires a solid and secured infrastructure foundation 1st. In order for customers to buy into Cloud & the whole IoT, and connected AI set of products and services; the customer must feel that they can trust you fully.
By Jayadev Parida
Take a stock of the past, analyse the present cliché and frame a strategy for future. In the recent years, India’s approach to cyber security has experienced a shift from style to substance. Prime Minister Modi’s foreign policy has made various strong interventions on cyber security matters. Those interventions need to be materialised to manoeuvre the interest. Presumably, the Prime Minister Office (PMO) is likely to invest both political and capital energy to enhance a cautious cyber-strategy. A dedicated Division in the Indian Ministry of External Affairs (MEA) for cyber security is a value addition to that. In 2015, Minister of Communications and Information Technology in a written reply to the Lok Sabha stated that government allocated Rs 755 crore to combat cyber security threats over a period of five years. But, this financial outlay is quite negligible as the nature of threat is quite huge and unpredictable.
Continue reading “Need To Beef Up India’s Cyber Security Policies And Mechanisms – Analysis” »
Feb 24, 2016
Baltimore hackers say they reveal potentially deadly cybersecurity weaknesses at area hospitals
Posted by Karen Hurst in categories: biotech/medical, cybercrime/malcode
What happens when a patient is in X-Ray and the X-Ray machine blows up like a bomb killing the patient and staff in the room? Well, a new report shows that it can happen where machines are connected to any network (including the net) because a team of hackers showed in their report how they were they hacked several D.C. and Maryland Hospitals medical devices and numerous machines including life support, X-Rays, etc.
Area hospitals are riddled with cybersecurity flaws that could allow attackers to hack into medical devices and kill patients, a team of Baltimore-based researchers has concluded after a two-year investigation.
Hackers at Independent Security Evaluators say they broke into one hospital’s systems remotely to take control of several patient monitors, which would let an attacker disable alarms or display false information.
Feb 24, 2016
Cybersecurity Expert Finds Nissan Leaf Susceptible to Hacking
Posted by Karen Hurst in categories: cybercrime/malcode, health
One of the many reasons why hacking is a dangerous to our health. If a hacker can hack your Leaf and control heat/ air, collect data on your trips, they can also shutdown your engine abruptly on the road too.
Nissan’s Leaf may be hackable.
Continue reading “Cybersecurity Expert Finds Nissan Leaf Susceptible to Hacking” »
Feb 24, 2016
When Malware Becomes a Service, Anyone Can Be a Hacker
Posted by Karen Hurst in categories: business, cybercrime/malcode
A very bad and at times dangerous trend:
Hackers for hire; very lucrative new consulting business for out of work tech specialists.
As hackers switch to malware-as-a-service model to make their malicious tools and services available to general public, security firms struggle to find a way to catch the bad guys.
Continue reading “When Malware Becomes a Service, Anyone Can Be a Hacker” »
Feb 24, 2016
Are these the most dangerous baby-faced hackers in the UK?
Posted by Karen Hurst in category: cybercrime/malcode
Key UK Hackers profiled like rock stars.
CYBER villains have got Brit cops right where they want them.
Feb 24, 2016
Ireland can become global cyber security hub — study
Posted by Karen Hurst in categories: business, cybercrime/malcode
Ireland has real opportunity to benefit from increased global investment and establish itself as a world-class hub for cyber security practices, solutions and investment, according to a new report from Deloitte. Conducted in association with the International Sustainability and Investment Centre, the report found that Ireland has proven itself to be an innovative centre for technology and has the potential to become a world leader in cyber security.
Respondents to a survey for this report identified increased regulation on data privacy (73%), more sophisticated scamming and phishing (59%), and growth in identity theft (53%) as the major trends in the cyber area over the next five years. This will force businesses to change how they organise and manage their data security.
More than one third (36%) of respondents believe there will a trend towards outsourcing cyber management to third party organisations, and 27 percent think that businesses will establish global/regional centres of excellence for managing this function. The implication of this will be that a small number of locations will be preferred for basing these centres of excellence.
Continue reading “Ireland can become global cyber security hub — study” »
Feb 24, 2016
Cyber Security: How to Protect Your Firm and its Clients
Posted by Karen Hurst in categories: biotech/medical, cybercrime/malcode, law
Law Firms are prime targets for hackers.
Law firms are considered by many hackers to be soft targets with a wealth of valuable information. Data from social security numbers, credit cards, and client confidences is enough to make the criminal mind salivate with malicious intent. Between 31–45% and 10–20% of firms have been infected by spyware or experienced security breaches respectively. But what can a private practitioner or law firm do to prevent these trespasses on their networks?
Continue reading “Cyber Security: How to Protect Your Firm and its Clients” »
Feb 23, 2016
Calif.‘s Harris Outlines ‘Reasonable’Data Security
Posted by Karen Hurst in categories: business, cybercrime/malcode, internet, law, policy, quantum physics
I wish the CA AG a lot of luck; however, her approach is very questionable when you think about downstream access and feed type scenarios. Example, Business in Boston MA has an agreement with a cloud host company in CA, and Boston also has data that it pulls in from Italy, DE, etc. plus has a service that it offers to all of users and partners in the US and Europe that is hosted in CA.
How is the CA AG going to impose a policy on Boston? It can’t; in fact the business in Boston will change providers and choose to use someone in another state that will not impact their costs and business.
BTW — I didn’t even mention the whole recent announcement from China on deploying out a fully Quantum “secured” infrastructure. If this is true; everyone is exposed and this means there is no way companies can be held accountable because US didn’t have access to the more advance Quantum infrastructure technology.
Continue reading “Calif.‘s Harris Outlines ‘Reasonable’Data Security” »