Browsing Category
Cybersecurity
Some hotel door locks are vulnerable to hacking, where “master keys” can open the doors without a trace on activity logs. Not only can this hack be used to open doors, but it can also be used to access restricted floors. Some of the largest hotel chains in the world currently use these locks,…
Read More...
Orangeworm has been identified as an active hacking group that aims to infiltrate healthcare systems most prominently, in the U.S, Europe, and Asia. These hackers can enter hospital systems because of the use of outdated software to retrieve data about the users and spread throughout these areas.…
Read More...
Telegraph: A little under 170 companies across the UK were surveyed, and more than 80 manufacturing plants have been hit by cyber-attacks. Because there’s malware designed to sit in the background, it is possible some manufactures could be entirely unaware of attacks as well. Read the article here.
Read More...
Independent: The risk of a sizable cyber-attack on the UK, specifically to critical infrastructure, has gone up significantly. The UK’s National Cyber Security Strategy promotes many measures to minimize disruptions, but an early warning system is still needed. The article also discusses possible…
Read More...
Reuters: Hackers attacked many data centers worldwide, including 3,500 in Iran. The hack left a picture of an American flag along with the message “Don’t mess with our elections” on affected devices. This attack was probably due to a vulnerability in Cisco routers, which was recently discovered and…
Read More...
Straits Times: McAfee, a California-based security software company has suggested gamers make the best cyber security experts. According to a report done by McAfee, gamers tend to have important skills for the job including endurance, perseverance, perspective, and problem-solving skills. As cyber…
Read More...
Jon Schuppe, NBC News:
Last week, Baltimore’s 911 center experienced an attempted ransomware attack when its dispatch system was hacked, resulting in a temporary shutdown of city’s computer aided dispatch, CAD, system for 17 hours. According to data compiled by the cyber security firm SecuLore,…
Read More...
Bloomberg: Facebook is being watched closely by the Federal Trade Commission, the leading agency in enforcing companies’ privacy policies. There’s evidence suggesting Facebook violated their privacy policies by sharing personal user data without consent. If Facebook is found to be guilty, they could…
Read More...
Security Magazine: Making company security more than just a part of company culture is a highly necessary reality. Many companies value security, but do not necessarily go far enough in making it part of day-to-day operations, leaving many at risk. The article suggests that every company make a…
Read More...
Security Week: A Cyber-Digital Task Force is being launched to aid the Department of Justice in improving cybersecurity and combatting threats. Some of the areas this group will focus on include election interference, infrastructure interference, the internet as a way to spread violence, and data…
Read More...
CBS News: Olympic organizers are currently investigating a security breach that occurred during the opening ceremony, as well as a possible cyber-attack that targeted their internet before the ceremonies began. During past Olympics, millions of cyberattacks were attempted daily. This year, the…
Read More...
Harvard Business Review: The risk of intelligent devices will soon be greater than the risk posed by natural disasters, according to the article. Our growing dependence on artificial intelligence (AI) is pointing more and more towards the possibility of large-scale shutdowns. Natural disaster…
Read More...
This CSO online article summarizes many of the top trends in cybersecurity in 2018. These trends include AI (artificial intelligence) powered attacks, sandbox-evading malware, randsomware and IoT (internet of things), failure to comply with the GDPR (General Data Protection Regulation), standards…
Read More...
Last week, researchers at Google revealed two security vulnerabilities, Spectre and Meltdown. These two vulnerabilities affect numerous electronic devices, from desktops to handheld devices, and can be used by hackers to access personal user information, such as passwords, key chains, and even…
Read More...