admin

0 Comments
Close to 40% of security professionals either know, or have known, a legitimate security practitioner who has participated at some point in black hat activities. A recent study on the cost of cybercrime to organizations delved into growing concerns about the gray hat hacker — a security professional who participates in black hat activities. Researchers
0 Comments
by Danny Bradbury Hackers are taking over high-profile Instagram users’ accounts and holding them to ransom, it was revealed this week. At least four influencers have lost control of their accounts and received demands to send bitcoin for their return, but in some cases the attackers retained control or deleted the accounts. Motherboard reported that
0 Comments
US financial services firms suffered three-times more data breaches in the first six months of 2018 than during the same period in 2016, according to new data from Bitglass. The security vendor aggregated data from the Identity Theft Resource Center (ITRC) and the Privacy Rights Clearinghouse (PRC) to gain insight for its Financial Breach Report
0 Comments
WeLiveSecurity is happy to support the European Cyber Security Month (ECSM) with its own “two cents”, split into four articles over the course of October that will be dedicated to promoting the campaign’s goals Information and communications technologies permeate our day-to-day lives and are vital for the daily operations of both enterprises and governments. This
0 Comments
An Active Directory deployment may seem straightforward, but it takes a bit of groundwork to set up a Windows Server 2016 domain controller. Active Directory Domain Services needs to be installed and managed by an IT administrator with a background in Windows Server 2016 and Windows environments. They should research the Active Directory (AD) domain
0 Comments
The Information Commissioner’s Office (ICO) has fined Bupa Insurance Services Limited (Bupa) £175,000 for its failure to protect the personal information of its customers. Had the timing of the breach been different, Bupa would have faced fines under the General Data Protection Regulations (GDPR), but the security incident occurred prior to those regulations going into
0 Comments
Crozer-Keystone Health System in Pennsylvania comprises five hospitals and operates several outpatient centers, a sports club, and a comprehensive physician network of primary-care and specialty practices. Systems Engineer Michael Mize works daily to protect the sensitive data of thousands of patients served by more than 1,000 physicians and 6,000 total employees. Mize has seen first-hand how the threat
0 Comments
Chinese cybersecurity researchers have uncovered a widespread, ongoing malware campaign that has already hijacked over 100,000 home routers and modified their DNS settings to hack users with malicious web pages—especially if they visit banking sites—and steal their login credentials. Dubbed GhostDNS, the campaign has many similarities with the infamous DNSChanger malware that works by changing
0 Comments
It has yet to be determined whether the accounts were misused or what information was accessed. In the meantime, you can improve your account security with a few easy steps Facebook disclosed on Friday, September 28, that attackers had exploited a flaw in its code that allowed them “to steal Facebook access tokens which they
0 Comments
VC firms haven’t been the only ones raising hundreds of millions of dollars to invest in a booming market. After 15+ years of being the last industry anyone wanted to invest in, the music industry is coming back, and money is flooding in to buy up the rights to popular songs. As paid streaming subscriptions
0 Comments
A call for new cybersecurity leadership came from Massachusetts governor Charlie Baker at yesterday’s 2018 Massachusetts Cybersecurity Forum. Hosted by Gov. Baker, the forum brought together more than 200 of the state’s foremost practitioners from the public and private sectors. The forum included thought leaders from cybersecurity companies, universities and research and development centers to
0 Comments
ESET CTO Juraj Malcho outlines some of the ways in which organizations can reduce their cybersecurity risk Given our growing digital dependency, cybersecurity incidents and the exploitation of security soft spots can have serious and cascading ramifications for businesses and their customers. Recent history has seen no shortage of high-profile cyberattacks and data breaches, giving
0 Comments
Employee monitoring to protect against data loss and misuse is becoming mandatory in more industries, but insider security is harder than ever to enforce. As more regulations around data privacy and missteps at high-profile companies generate ongoing headlines, security teams attempt to monitor insider threats without stepping into the quagmire.  Teramind, a startup in Miami
0 Comments
At a Senate hearing this week in which US lawmakers quizzed tech giants on how they should go about drawing up comprehensive Federal consumer privacy protection legislation, Apple’s VP of software technology described privacy as a “core value” for the company. “We want your device to know everything about you but we don’t think we should,” Bud
0 Comments
by Anna Brading Facebook has suffered a data breach affecting almost 50 million accounts. Another 40 million have been reset as a “precautionary step”. What’s happened? In a post on the site earlier today, Facebook’s VP of Product Management, Guy Rosen, said that the breach was discovered on Tuesday 25 September 2018. Attackers exploited a