tag:blogger.com,1999:blog-79788776552421891402024-03-13T06:10:53.763-07:00CISP Cyber SecurityCyber Security Compliance for Power, Oil & Gas, Water Treatment, NERC-CIP, NEI 0809 and CFATSInvensys Operations Managementhttp://www.blogger.com/profile/04740015638831888455noreply@blogger.comBlogger620125tag:blogger.com,1999:blog-7978877655242189140.post-66629486506283781962015-01-30T06:00:00.000-08:002015-01-30T06:00:05.859-08:00Cyber Security: Five New Year's resolutions for your computerYour computer might be showing its age, be it slow boot-up times, sluggish performance, annoying freeze-ups and pop-up windows caused by malware ("malicious software"). This is especially frustrating for those who rely on their computer for work. Instead of buying a new computer, however, perhaps you can squeeze more life out of your aging PC or Mac. Click <a href="http://www.usatoday.com/story/tech/columnist/saltzman/2015/01/24/computers-resolutions/22156689/?utm_source=feedblitz&utm_medium=FeedBlitzRss&utm_campaign=usatodaycomtech-personaltalk" target="_blank">here</a> to read about five New Year's resolutions for your computer.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-t91Y62iOixc/VMaAgQXHQLI/AAAAAAAAA8E/cCXx9Sw0l94/s1600/635575236952799230-466378123.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-t91Y62iOixc/VMaAgQXHQLI/AAAAAAAAA8E/cCXx9Sw0l94/s1600/635575236952799230-466378123.jpg" height="240" width="320" /></a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-77226970849860256332015-01-29T06:00:00.000-08:002015-01-29T06:00:05.529-08:00Cyber Security: Hackers deface Malaysia Airlines website, upload rap songThe Malaysia Airlines website has been commandeered by hackers who referenced Islamic State and claimed to be from the "Lizard Squad", a group known for previous denial-of-service attacks. Read more <a href="http://www.smh.com.au/it-pro/security-it/hackers-deface-malaysia-airlines-website-upload-rap-song-20150126-12yghh.html" target="_blank">here</a>.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-8iS5nw1Ct4E/UbXXwjl9k2I/AAAAAAAAAZI/ZgIBNz3dizk/s1600/thCAF7788G.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/-8iS5nw1Ct4E/UbXXwjl9k2I/AAAAAAAAAZI/ZgIBNz3dizk/s1600/thCAF7788G.jpg" /></a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-9041809634440133042015-01-28T06:00:00.000-08:002015-01-28T06:00:04.112-08:00Cyber Security: Computer security experts warn of cell phone hack attacksText messages from your phone company could mean a security problem for you. Those texts are apparently so easy to mimic that crooks could send you alerts that look like the real thing. Click on those links and the hacker could grab your login information, or fool you into divulging your credit card details. Read the article <a href="http://www.fox28.com/story/27926651/2015/01/23/computer-security-experts-warn-of-texting-scams" target="_blank">here</a>.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-b91mpwMTAMg/UEjEzQslctI/AAAAAAAAAHE/p-j3XjP2Uqk/s1600/smartphone.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://2.bp.blogspot.com/-b91mpwMTAMg/UEjEzQslctI/AAAAAAAAAHE/p-j3XjP2Uqk/s1600/smartphone.JPG" height="226" width="320" /></a></div>
<br /><span id="goog_1350044957"></span><a href="https://www.blogger.com/"></a><span id="goog_1350044958"></span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-54282645489418076552015-01-27T06:00:00.000-08:002015-01-27T06:00:01.753-08:00Cyber Security: Hackers could infiltrate NSW traffic and sewage systems, Auditor-General Grant Hehir warnsHackers could infiltrate Sydney's traffic light network and cause accidents or road chaos, an official investigation has found, raising serious doubts over the preparedness of the state's vital infrastructure to ward off cyber attacks. Click <a href="http://www.smh.com.au/it-pro/security-it/hackers-could-infiltrate-nsw-traffic-and-sewage-systems-auditorgeneral-grant-hehir-warns-20150125-12xkag.html" target="_blank">here</a> to read the article.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-55-_rTPU9w8/VMZ-8pc03UI/AAAAAAAAA78/fRz5gt84VUM/s1600/1422168311498.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-55-_rTPU9w8/VMZ-8pc03UI/AAAAAAAAA78/fRz5gt84VUM/s1600/1422168311498.jpg" height="180" width="320" /></a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-67947084688794197812015-01-26T09:50:00.004-08:002015-01-26T09:50:35.964-08:00Cyber Security: A Thief Named 'Mastermind' Hacked 20 Million Accounts On A Russian Dating WebsiteAs if online dating wasn't sketchy enough, now you have to worry about hackers. About 20 million accounts on a Russia-based dating website called Topface were hacked, according to a report by Bloomberg. About 40% of the data came from European users. The thief who operated under the alias "Mastermind" then offered the accounts for sale on a website used by cyber criminals, which was detected by the fraud-detection software-maker, Easy Solutions Inc. Read more <a href="http://www.sfgate.com/technology/businessinsider/article/A-Thief-Named-Mastermind-Hacked-20-Million-6040392.php" target="_blank">here</a>.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-XQL5IWobLOU/UhuHgP8ZCcI/AAAAAAAAAiI/fQcIwBUlp0w/s1600/thCALSANUS.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/-XQL5IWobLOU/UhuHgP8ZCcI/AAAAAAAAAiI/fQcIwBUlp0w/s1600/thCALSANUS.jpg" /></a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-27323504417696599492015-01-26T09:41:00.001-08:002015-01-26T09:41:07.509-08:00Cyber Security: ICS-CERT Vulnerability Summary for Week of January 19Click the link below to view the summary of cyber security vulnerabilities for the week of January 19 as collected and reported by <a href="http://ics-cert.us-cert.gov/" target="_blank">ICS-CERT</a>.<br />
<br />
<a href="https://www.us-cert.gov/ncas/bulletins/SB15-026" target="_blank">https://www.us-cert.gov/ncas/bulletins/SB15-026</a><br />
<br />
<div class="separator" style="-webkit-text-stroke-width: 0px; border: currentColor; clear: both; color: black; letter-spacing: normal; margin: 0px; text-align: center; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;">
<a href="http://3.bp.blogspot.com/-cU3cvRAFxAM/UHcsjg020nI/AAAAAAAAALY/r0b5BPDRU2g/s1600/ICS+CERT+weekly+bulletin+logo.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-cU3cvRAFxAM/UHcsjg020nI/AAAAAAAAALY/r0b5BPDRU2g/s1600/ICS+CERT+weekly+bulletin+logo.png" nea="true" /></a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-57838492636124798952015-01-23T06:00:00.000-08:002015-01-23T06:00:01.509-08:00Cyber Security: ‘Malvertising’ the latest threat to computer securityThe recent barrage of stories about computer security attacks are enough to make you unplug your computer and go back to reading books and writing letters. Well, it turns out there’s another one consumers need to have on their radar. It’s called “malvertising,” and USA TODAY reports that it’s malicious software — what we call malware — hidden in online ads. Often, the advertiser doesn’t even know it’s there, much less you. But malvertising works differently than plain old malware. Click <a href="http://wtop.com/consumer-tech/2015/01/malvertising-latest-threat-computer-security/" target="_blank">here</a> to read more.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-FA9wwaoTang/Ub8R8bkilsI/AAAAAAAAAZs/C_nMAcFsnZM/s1600/Malware.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-FA9wwaoTang/Ub8R8bkilsI/AAAAAAAAAZs/C_nMAcFsnZM/s1600/Malware.jpg" height="213" width="320" /></a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-75815586324470466672015-01-22T06:00:00.000-08:002015-01-22T06:00:00.556-08:00Cyber Security: Progressive Insurance snapshot dongle is hackableJalopnik reported Jan. 20, 2015 that an independent security researcher has confirmed the security vulnerabilities that lie within the OBDII dongle that Progressive Insurance provides more than 2 million customers. Simply put, there is no security encryption coded into the devices between the OBDII port, your car's CAN bus system and Progressive Insurance's servers to the devices. According to Corey Thuen of Digital Bonds Labs, any enterprising entry level hacker can potentially access the same information that Progressive sees seriously compromising whatever information is being shared between you and your insurer. Read the article <a href="http://www.examiner.com/article/progressive-insurance-snapshot-dongle-is-hackable-and-can-weaponize-cars?cid=rss" target="_blank">here</a>.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-nfPj8KeAQYk/VMAa2zZU8RI/AAAAAAAAA7s/2pSwK6YugG4/s1600/95b774c969717ef38e9db8e54b2404c1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/-nfPj8KeAQYk/VMAa2zZU8RI/AAAAAAAAA7s/2pSwK6YugG4/s1600/95b774c969717ef38e9db8e54b2404c1.jpg" height="212" width="320" /></a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-24268584275088462772015-01-21T06:00:00.000-08:002015-01-21T06:00:03.867-08:00Cyber Security: UK and US spies to carry out fake hacking attacks on banks, airlines and nuclear plants <div class="mol-para-with-font">
Britain and the US are to set up a joint ‘cyber squad’ to carry out fake hacking attacks on banks, aircraft and nuclear power plants. In talks at the White House, David Cameron and Barack Obama are set to agree an unprecedented level of co-operation, with a team of agents to help safeguard both countries. A report from British spy chiefs to be published today says four in every five big firms in the UK last year experienced some sort of serious cyber security breach. Click <a href="http://www.dailymail.co.uk/news/article-2912526/PM-Obama-s-cyber-squad-tackle-hackers-Britain-set-joint-unit-protect-banks-aircraft-nuclear-plants-threat-online-attack.html" target="_blank">here</a> to read the article.</div>
<div class="mol-para-with-font">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-LE4M4EPW7fI/VL6nZfSIbXI/AAAAAAAAA7c/fSmWOtoU6iQ/s1600/24BD0AF000000578-0-image-a-5_1421370230719.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/-LE4M4EPW7fI/VL6nZfSIbXI/AAAAAAAAA7c/fSmWOtoU6iQ/s1600/24BD0AF000000578-0-image-a-5_1421370230719.jpg" height="231" width="320" /></a></div>
<div class="mol-para-with-font">
</div>
<div class="mol-para-with-font">
</div>
<div class="mol-para-with-font">
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-4129669760017549422015-01-20T06:00:00.000-08:002015-01-20T06:00:03.427-08:00Cyber Security: Website of Georgian state minister's apparatus subjected to cyber attackThe website of the apparatus of Georgian state minister for diaspora affairs, diaspora.gov.ge that was subjected to cyber attack on Jan.18, still doesn't work. Click <a href="http://en.trend.az/scaucasus/georgia/2354636.html" target="_blank">here</a> for the article.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-JFVffY4dg10/T3Db-ZGxQ2I/AAAAAAAAACE/Oqp5gPf36JI/s1600/water%2Bwith%2Bpadlock.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/-JFVffY4dg10/T3Db-ZGxQ2I/AAAAAAAAACE/Oqp5gPf36JI/s1600/water%2Bwith%2Bpadlock.jpg" /></a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-18090641591503839872015-01-19T08:56:00.002-08:002015-01-19T08:56:39.739-08:00Cyber Security: Threat of Cyber Attacks Must Be Priority for Corporate BoardsThe threat of cyber attacks must be taken more seriously by corporate boards at Britain's largest companies, according to a survey by KPMG LLP today. Less than 40 percent of board members in the FTSE 350 Index companies said they viewed cyber attacks as a more serious risk than other potential pitfalls, the survey said. Read the article <a href="http://the%20threat%20of%20cyber%20attacks%20must%20be%20taken%20more%20seriously%20by%20corporate%20boards%20at%20britain's%20largest%20companies,%20according%20to%20a%20survey%20by%20kpmg%20llp%20today.%20less%20than%2040%20percent%20of%20board%20members%20in%20the%20ftse%20350%20index%20companies%20said%20they%20viewed%20cyber%20attacks%20as%20a%20more%20serious%20risk%20than%20other%20potential%20pitfalls,%20the%20survey%20said./" target="_blank">here</a>.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-OCCCpyChwyU/UlLC9-7eETI/AAAAAAAAAmc/cgD9gBBZYX8/s1600/cyberSecurity.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-OCCCpyChwyU/UlLC9-7eETI/AAAAAAAAAmc/cgD9gBBZYX8/s1600/cyberSecurity.jpg" height="240" width="320" /></a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-37040905034061126752015-01-19T08:46:00.004-08:002015-01-19T08:46:49.720-08:00Cyber Security: ICS-CERT Vulnerability Summary for Week of January 12Click the link below to view the summary of cyber security vulnerabilities for the week of January 12 as collected and reported by <a href="http://ics-cert.us-cert.gov/" target="_blank">ICS-CERT</a>.<br />
<br />
<a href="https://www.us-cert.gov/ncas/bulletins/SB15-019" target="_blank">https://www.us-cert.gov/ncas/bulletins/SB15-019</a><br />
<br />
<div class="separator" style="-webkit-text-stroke-width: 0px; border: currentColor; clear: both; color: black; letter-spacing: normal; margin: 0px; text-align: center; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;">
<a href="http://3.bp.blogspot.com/-cU3cvRAFxAM/UHcsjg020nI/AAAAAAAAALY/r0b5BPDRU2g/s1600/ICS+CERT+weekly+bulletin+logo.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-cU3cvRAFxAM/UHcsjg020nI/AAAAAAAAALY/r0b5BPDRU2g/s1600/ICS+CERT+weekly+bulletin+logo.png" nea="true" /></a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-26151672856260898402015-01-16T06:00:00.000-08:002015-01-16T06:00:02.902-08:00Cyber Security: Human element remains weakest link in data securityUser error, and lazy humans, are the biggest weakness in most businesses' data security systems, according to a local expert. Read more <a href="http://www.bizjournals.com/dayton/news/2015/01/15/dayton-expert-human-element-remains-weakest-link.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+vertical_47+%28Telecom+Industry+News%29" target="_blank">here</a>.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-DC5v2g0I5v4/UYPfUcanqiI/AAAAAAAAAV8/zY9Up2yu1D8/s1600/cyber-security-warning.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-DC5v2g0I5v4/UYPfUcanqiI/AAAAAAAAAV8/zY9Up2yu1D8/s1600/cyber-security-warning.jpg" /></a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-86076034879909933492015-01-15T06:00:00.000-08:002015-01-15T06:00:07.432-08:00Cyber Security: CENTCOM'S Twitter, YouTube accounts hacked The Twitter and YouTube accounts of the Pentagon's command for its forces in the Middle East were hacked Monday, according to U.S. Central Command. Click <a href="http://www.khou.com/story/news/nation/2015/01/12/twitter-centcom-isis/21640577/" target="_blank">here</a> to read the article.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-JBP7Lo_kEnw/VLa_twbBqJI/AAAAAAAAA7M/cTQqU3oBsso/s1600/D81IJP3NIA24L23E-rsz320x240-cp0x40x320x200.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-JBP7Lo_kEnw/VLa_twbBqJI/AAAAAAAAA7M/cTQqU3oBsso/s1600/D81IJP3NIA24L23E-rsz320x240-cp0x40x320x200.png" /></a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-23757566182647456022015-01-14T06:00:00.000-08:002015-01-14T06:00:00.326-08:00Cyber Security: Hackers Steal Miles of American, United CustomersThieves with stolen usernames and passwords have broken into customer accounts at American and United airlines and in some cases booked free trips. The airlines say the incidents happened in late December. American began notifying affected customers by email on Monday, a spokeswoman said.<br />
American spokeswoman Martha Thomas said that about 10,000 accounts were affected and some have been frozen while the airline and customer set up new accounts, starting with customers who have at least 100,000 miles. She said the airline isn't aware of anyone booking a free trip. Read the article <a href="http://www.newsmax.com/US/american-united-hacking-miles/2015/01/12/id/618066/" target="_blank">here</a>.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-W-FPAolsdPY/VLWMVIdxaPI/AAAAAAAAA68/O3e356OpSqc/s1600/th.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-W-FPAolsdPY/VLWMVIdxaPI/AAAAAAAAA68/O3e356OpSqc/s1600/th.jpg" /></a></div>
<br />
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-67967831560351607702015-01-13T06:00:00.000-08:002015-01-13T06:00:07.351-08:00Cyber Security: UK National Grid under constant cyber attack<div style="background: white; margin: 0cm 0cm 10pt;">
Conservative MP James Arbuthnot chaired the Defense Select Committee up until last year and said that the National Grid is facing cyber-attacks every minute. He plans to visit the National grid next month to discuss the issue. "Our National Grid is coming under cyber attack not just day-by-day but minute-by-minute,” said Arbuthnot at a London conference last year, with his comments first reported by Bloomberg. “There are, at National Grid, people of very high quality who recognize the risks that these attacks pose, and who are fighting them off…but we can't expect them to win forever.” Click <a href="http://www.scmagazineuk.com/uk-national-grid-under-constant-cyber-attack/article/391972/" target="_blank">here</a> to read more.</div>
<div style="background: white; margin: 0cm 0cm 10pt;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-Kmx4-f9pNzc/VLQA8r09tlI/AAAAAAAAA6s/W88CjsjAAXU/s1600/nationalgrid_689890.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-Kmx4-f9pNzc/VLQA8r09tlI/AAAAAAAAA6s/W88CjsjAAXU/s1600/nationalgrid_689890.jpg" /></a></div>
<div style="background: white; margin: 0cm 0cm 10pt;">
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-25432102232504079922015-01-12T09:10:00.000-08:002015-01-12T09:10:00.433-08:00Cyber Security: AOL Ad Network Hit with MalvertisingCybercriminals have targeted one of the largest digital networks to kick off the year: AOL's Advertising.com. Hackers hijacked ads on the network and served up drive-by malware downloads to the Huffington Post, GameZone, LA Weekly and several other sites last week, according to Cyphort, an advanced malware defense firm. Read the full story <a href="http://www.newsfactor.com/story.xhtml?story_id=0230024414OR" target="_blank">here</a>.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-VBIol0u8eWU/VLP_33CvKZI/AAAAAAAAA6k/33yW3xIBoRQ/s1600/larger-15-HACKER-malware-AOL-1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-VBIol0u8eWU/VLP_33CvKZI/AAAAAAAAA6k/33yW3xIBoRQ/s1600/larger-15-HACKER-malware-AOL-1.jpg" height="156" width="320" /></a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-35521679331537493172015-01-12T09:00:00.000-08:002015-01-12T09:00:02.741-08:00Cyber Security: ICS-CERT Vulnerability Summary for Week of January 5Click the link below to view the summary of cyber security vulnerabilities for the week of January 5 as collected and reported by <a href="http://ics-cert.us-cert.gov/" target="_blank">ICS-CERT</a>.<br />
<br />
<a href="https://www.us-cert.gov/ncas/bulletins/SB15-012" target="_blank">https://www.us-cert.gov/ncas/bulletins/SB15-012</a><br />
<br />
<div class="separator" style="-webkit-text-stroke-width: 0px; border: currentColor; clear: both; color: black; letter-spacing: normal; margin: 0px; text-align: center; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;">
<a href="http://3.bp.blogspot.com/-cU3cvRAFxAM/UHcsjg020nI/AAAAAAAAALY/r0b5BPDRU2g/s1600/ICS+CERT+weekly+bulletin+logo.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-cU3cvRAFxAM/UHcsjg020nI/AAAAAAAAALY/r0b5BPDRU2g/s1600/ICS+CERT+weekly+bulletin+logo.png" nea="true" /></a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-55801994447900693472015-01-09T06:00:00.000-08:002015-01-09T06:00:02.298-08:00Cyber Security: Pro-Russian group claims cyber attack on German government websitesGerman government websites including Chancellor Angela Merkel's page were hacked on Wednesday in a cyber attack claimed by a group demanding that Berlin sever official ties with the Ukrainian government. The attack, against which counter-measures were taken, had left the sites periodically inaccessible since 10 a.m. , her spokesman Steffen Seibert said. Read the article <a href="https://au.news.yahoo.com/thewest/business/technology/a/25925209/pro-russian-group-claims-cyber-attack-on-german-government-websites/" target="_blank">here</a>.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-XG6JpIMdOIE/T2Z4dVvTvNI/AAAAAAAAABw/s8qGH9jFNWE/s1600/Data%2BSecurity.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-XG6JpIMdOIE/T2Z4dVvTvNI/AAAAAAAAABw/s8qGH9jFNWE/s1600/Data%2BSecurity.jpg" height="213" width="320" /></a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-88409009649431896892015-01-08T06:00:00.000-08:002015-01-08T06:00:00.920-08:00Cyber Security: Tampa #1 in nation for computer hacker attacksTampa is number one in the nation, but not for the reason you might hope. A new study from EnigmaSoftware.com finds this region is the single-most hacked spot in the country when it comes to people's personal computers. Click <a href="http://www.wtsp.com/story/tech/2015/01/05/hacking-tampa-hacked-florida-highest-rate/21297285/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+wtsp%2Flocal+%28WTSP.com+10+News+Local+News%29" target="_blank">here</a> to read the article. <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-sAUaBhfW1f4/UhuF4RKveII/AAAAAAAAAh8/HtQEMOk7hQk/s1600/art-mobile-PC-laptop-620x349.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-sAUaBhfW1f4/UhuF4RKveII/AAAAAAAAAh8/HtQEMOk7hQk/s1600/art-mobile-PC-laptop-620x349.jpg" height="180" width="320" /></a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-37855474377498795022015-01-07T08:45:00.003-08:002015-01-07T08:45:22.543-08:00Cyber Security: ICS-CERT Vulnerability Summary for Week of December 29Click the link below to view the summary of cyber security vulnerabilities for the week of December 29 as collected and reported by <a href="http://ics-cert.us-cert.gov/" target="_blank">ICS-CERT</a>.<br />
<br />
<a href="https://www.us-cert.gov/ncas/bulletins/SB15-005" target="_blank">https://www.us-cert.gov/ncas/bulletins/SB15-005</a><br />
<br />
<div class="separator" style="-webkit-text-stroke-width: 0px; border: currentColor; clear: both; color: black; letter-spacing: normal; margin: 0px; text-align: center; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;">
<a href="http://3.bp.blogspot.com/-cU3cvRAFxAM/UHcsjg020nI/AAAAAAAAALY/r0b5BPDRU2g/s1600/ICS+CERT+weekly+bulletin+logo.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-cU3cvRAFxAM/UHcsjg020nI/AAAAAAAAALY/r0b5BPDRU2g/s1600/ICS+CERT+weekly+bulletin+logo.png" nea="true" /></a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-23178898319651119982015-01-07T06:00:00.000-08:002015-01-07T06:00:06.864-08:00Cyber Security: Retail cyber attacks drop by half despite rising data theftA report released Monday from IBM security researchers suggests that, overall, cyber attacks against retailers are on the decline, even though the total amount of data compromised continues to steadily rise. Read the article <a href="http://www.zdnet.com/article/retail-cyber-attacks-drop-by-half-despite-rising-data-theft-ibm/#ftag=RSSbaffb68" target="_blank">here</a>.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-_PQGKqPP1TE/UHWogNehwCI/AAAAAAAAAKw/ZjlH2P9GdhQ/s1600/cyberSecurity.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/-_PQGKqPP1TE/UHWogNehwCI/AAAAAAAAAKw/ZjlH2P9GdhQ/s1600/cyberSecurity.jpg" height="240" width="320" /></a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-65159057697274283142015-01-06T06:00:00.000-08:002015-01-06T06:00:06.706-08:00Cyber Security: 4 Moves You Need to Make Immediately After Your Credit Card Is HackedIf you paid for the bulk of your holiday shopping with plastic, you may not be looking forward to your first statement of the new year but you can’t afford not to. The holidays are prime time for identity thieves who want to get their hands on your personal information, as two MyBankTracker staffers recently found out. Read the article <a href="http://www.mybanktracker.com/news/credit-card-hacked" target="_blank">here</a>.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-Nta1_aFN5YM/UdGlikDdk-I/AAAAAAAAAcU/zbTpk7rE1Qg/s1600/credit-cards.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-Nta1_aFN5YM/UdGlikDdk-I/AAAAAAAAAcU/zbTpk7rE1Qg/s1600/credit-cards.jpg" height="224" width="320" /></a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-5723654947425405712015-01-05T09:12:00.003-08:002015-01-05T09:12:37.409-08:00Cyber Security: ID theft, IRA risks, stock scams in 2015The new year will bring a host of financial threats. Consumers should know what to do following data breaches and be aware of IRA-rollover penalties and topical stock-scam alerts. Click <a href="http://www.azcentral.com/story/money/business/consumer/2015/01/02/theft-ira-risks-stock-scams/21211255/?from=global&sessionKey=&autologin=" target="_blank">here </a>to read more.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-YiBrivB_W4E/UHMvLex6PiI/AAAAAAAAAJ0/g8LXCEwrIc0/s1600/identity-theft.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/-YiBrivB_W4E/UHMvLex6PiI/AAAAAAAAAJ0/g8LXCEwrIc0/s1600/identity-theft.jpg" height="212" width="320" /></a></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7978877655242189140.post-4655887115828698482015-01-02T10:42:00.002-08:002015-01-02T10:42:08.114-08:00Cyber Security: A Hacker Says He Can Recreate Fingerprints From PhotographsA speaker at a yearly hacking conference in Germany has claimed the ability to recreate someone's fingerprints using just photographs of their fingers, as reported by the BBC. This capability would highlight the compromised nature of replacing passwords with fingerprints, which is already seen by experts as far from fully secure. Read the full story <a href="http://www.sfgate.com/technology/businessinsider/article/A-Hacker-Says-He-Can-Recreate-Fingerprints-From-5984795.php" target="_blank">here</a>.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-1BGPFt8ZcDw/VKbmcqkpCbI/AAAAAAAAA6U/1Bm7nupfuQQ/s1600/fingerprint.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://2.bp.blogspot.com/-1BGPFt8ZcDw/VKbmcqkpCbI/AAAAAAAAA6U/1Bm7nupfuQQ/s1600/fingerprint.JPG" height="320" width="216" /></a></div>
Unknownnoreply@blogger.com0