bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
1:59 am, December 21, 2014

Search Result

Search Tags:  cyber security

#SEA strikes again

The Syrian Electronic Army (SEA) said hacked into Skype's social media accounts last week. Now the Internet calling service confirms it had been hit with a "cyber-attack" but said no user information was compromised. SEA posted a tweet posted on Skype's official Twitter feed that read: "Don't use Microsoft emails (hotmail, outlook). They are monitoring your accounts and selling the data to the governments. More details soon. #SEA"

Tags: UMUC , J.J. Green , The Cyber Security Report , cybersecurity

Monday - 01/06/2014, 08:54am EST

Resolve to protect your computer

What's the best thing you can do for your computer? Make sure that it's secure. Kaspersky Lab says you should don't invite bugs and malware in by allowing your computer systems to become outdated. The security company urges you to install operating system and application updates as soon as they're available. It also suggests using your software's built-in systems, and don't ignore the prompts they give you to update your computer security.

Tags: The Cyber Security Report , J.J. Green , UMUC , cybersecurity

Monday - 01/13/2014, 04:43pm EST

Cyber Silver Lining

With so much gloom and doom about Cyber vulnerabilities, the Rand Corporation has some good news. In his book Cyberdeterrence and Cyber war, Martin Libicki puts it into perspective --suggesting Cyberspace has its own laws; for instance, it is easy to hide identities and difficult to predict or even understand battle damage, and attacks deplete themselves quickly. But the overall message is cyber war is nothing so much as the manipulation of ambiguity.

Tags: The Cyber Security Report , J.J. Green , UMUC , cybersecurity

Monday - 01/13/2014, 04:44pm EST

Companies need to know when they are hacked

Recently several large U.S. companies were hacked online and like other victims of similar attacks, they were not aware until well after the attack happened. In some cases it was months. Online security firm Mandiant says, often attacks are blamed on malware, but they say 46% of compromised machines have no malware on them. Mandiant says hackers can navigate through conventional safeguards easily leaving little or no trace.

Tags: The Cyber Security Report , J.J. Green , UMUC ,

Tuesday - 01/21/2014, 10:20am EST

Online shopping risks grow

Devices such as smartphones and tablets are being used more and more often for online shopping and the Center for Internet Security is warning that means the volume of attacks against them will increase as well. The "center" says every time you download an app, you open yourself to potential vulnerabilities. Their advice is to research those apps you plan to download to verify their legitimacy. Update all apps when notified and disable Bluetooth and Near Field Communications when not in use to reduce the risk of your data, such as a credit card number, being intercepted by a nearby device.

Tags: UMUC , J.J. Green , The Cyber Security Report

Tuesday - 01/21/2014, 10:21am EST

Online shopping rules evolve

How do you shop securely online. The Center for Internet Security says you should "know your online merchants. Limit online shopping to merchants you know and trust. Only go to sites by directly typing the URL in the address bar. If you are unsure about a merchant, check with the Better Business Bureau or the Federal Trade Commission to ensure its legitimacy. Confirm the online seller's contact information in case you have questions or problems. Use a credit card, not a debit card. Credit cards are protected by the Fair Credit Billing Act and may reduce your liability if your information is used improperly.

Tags: UMUC , J.J. Green , The Cyber Security Report ,

Tuesday - 01/21/2014, 10:25am EST

Evidence of system hacks varies

How can you tell if your system has been compromised? Internet security firm Mandiant says there are numerous signs. Included are evidence of unauthorized use of valid accounts, trace evidence & partial files, command and control activity, known and unknown malware, suspicious network traffic, valid programs used for other purposes and files that have obviously been accessed by attackers. IT managers are reminded that threats can slip in undetected and lay dormant for long periods of time before striking.

Tags: UMUC , J.J. Green , The Cyber Security Report ,

Tuesday - 01/21/2014, 10:26am EST

CyberSecurity "Progress & Best Practices" Defense & Homeland 2014

Listen Tuesday January 28th @ 12pm
Program will discuss the following: Progress Report on CyberSecurity in Government, Profiles of Successful Cyber Programs, Top Priorities, Challenges still to overcome, and A Vision for The Future in CyberSecurity.

Tags: Trezza Media Group , Brendan Goode , Louis Tempkin , Jason Wright , LTG Ed Cardon , Marshall Lytle , Scott Stevens , Dell Software , General Dynamics Information Technology , Sourcefire

Thursday - 01/16/2014, 02:58pm EST

Britain pulls plug on spy cans

Officials say that an advertising firm must immediately stop using its network of high-tech trash cans to track people walking through London's financial district. The City of London Corporation says it has demanded Renew pull the plug on the program, which measures the Wi-Fi signals emitted by smartphones to follow commuters as they pass the garbage cans.

Tags: cybersecurity , The Cyber Security Report , J.J. Green , UMUC

Tuesday - 10/08/2013, 10:51am EDT

Adobe Source Code stolen

Kelly Jackson Higgins wrote in her "Hacking The Adobe Breach" column, "At first glance, the massive breach at Adobe that was revealed last week doesn't neatly fit the profile of a pure cybercrime attack." She said not only did the bad guys steal customer data and payment info, but they also got ahold of the company's source code for Adobe's ColdFusion, Acrobat, and Reader software. Criminal investigators are looking into whether it was an accident or they deliberately went after the source code.

Tags: cybersecurity , The Cyber Security Report , J.J. Green , UMUC

Tuesday - 10/08/2013, 10:53am EDT
  •  
  • 4
  •