Stream

Join this community to post or comment
 
Prevent Malware Operation or Lose $100k http://oversitesentry.com/?p=2543  Mega Metals got expensive #cybersecurity lesson 
A 30-year old scrap processor was hoping not to be in a national Newspaper article about what not to do with your information security. http://www.wsj.com/articles/hackers-trick-email-systems-into-wiring-them-large-sums-1438209816. Some Nigerians set up malware on the unsuspecting Metals ...
1
Add a comment...

CIGTR.info

Security  - 
 
The company continues denying it but it seems to be more and more evidences that computer elite mercenaries have assaulted the second US airline, United Airlines, robbing data from their passengers. United Airlines is the reference airline of the government, where their political, military and other VIPs fly. We will expand this information, we'll also talk about a new use that the cybercrime is giving to Twitter, a new tool for our electronic privacy and where is better not to go on vacation with our drone.
1
Add a comment...
 
Tora! Tora! Tora! Pearl Harbor in #Cyberspace http://oversitesentry.com/?p=2535  Tora means Suprise achieved - Prepare for it 
1
Add a comment...

CIGTR.info

Security  - 
 
The company Symantec claims to have discovered those responsible for the biggest data theft known so far, whose victims were 80 million people, customers of the second US insurer, Anthem. This would be the group Black Vine, formed by IT elite mercenaries. We'll talk about them and also about how easy it can be to assault a lockbox, an epic mistake of Belgian government and a success story that could have ended in tragedy: the fork of Bitcoin in 2013.
1
Add a comment...

Rob Ponce

Security  - 
 
Well, it's about time!!!
Windows 10 replaces Internet Explorer with Microsoft Edge, a brand-new browser that's much more secure.
2
James Parr's profile photoBrandon Petaccio's profile photo
2 comments
 
But... can it load webpages?
Add a comment...
 
2-Step Verification

Sometimes hackers behave like terrorists and try to destroy everything they are able to. A victim could suffer humiliation, identity theft, and lifetime suspension from services and social networks. For your Apple account there is a solution to increase security.

Sometimes an image is worth a thousand words.
Anyway here is the full information
http://iNotes4You.com/2014/05/07/2-step-verification

My post explains Apple's 2-Step Verification with a concept map created with the app INSPIRATION for the iPad.

An app review of INSPIRATION ...
http://iNotes4You.com/2014/03/20/inspiration

Thanks for dropping by.

7
3
Michael John Encarnación's profile photoVishal Mishra's profile photo
Add a comment...

Ryan Jones

Security  - 
 
what is, and always will be the weakest part of a computer system?
1
1
Ryan Jones's profile photoNSA TrollCat's profile photo
2 comments
 
+NSA TrollCat lol I'd make that same bet any day of the week
Add a comment...
 
Hi, need your feedback!   Would you install this app?

http://myki.co

Signup if interested and please please give me feedback, i'm ready to answer any question you might have and il throw in 5 months of free premium just to make it worth your while.

Thanks :)
The future of identity management is at your fingertips and your smartphone is now your password. With myki the hassle of creating, remembering and managing multiple passwords is now a thing of the past. Sign up today!
2
Add a comment...

Identacor

Security  - 
 
Whoop! Major Android vulnerability gives hackers system access with a simple text.

#Android #vulnerability #Security #Hackers  
1
1
Alan Beall's profile photo
Add a comment...

Patrick Bay

Security  - 
 
 
"Samy Kamkar, a Los Angeles-based security researcher and hardware hacker, has created a device called OwnStar that can find, unlock, and remote start General Motors cars equipped with OnStar. The hack, which is based on an exploit of OnStar's mobile software communications channel, exposes the credentials of a car's owner when it intercepts communications with OnStar's service. The device will be demonstrated at next week's DefCon security conference in Las Vegas."
Hack of OnStar Remotelink lets attacker unlock, remote-start, and track cars.
1
Add a comment...

SaferVPN

Security  - 
 
After United's reported breach, it's about time to rethink how you and your company protects your private data!

Read more at CNET!
1
Add a comment...

Rob Ponce

Security  - 
 
The part of this article that troubles me most...

"Is It Safe?
I have to hope that quality control for the coming 24/7 updates will be extremely thorough. Some prudent users currently set Windows Update to download updates automatically but install them manually. It's not clear as yet whether this will be possible under the new system."

Uh, last time I checked, "hope" isn't what keeps my computer systems running... well tested code does!
The old monthly patch cycle just isn't good enough anymore. Windows 10 fixes will stream to consumer PCs 24/7.
2
Add a comment...

Timothy King

Security  - 
 
Follow these 7 disaster recovery rules, or else!
"The ability of an organization to continue operations in the event of a natural or human-induced disaster is a critical concern for organizations of all shapes and sizes. Implementing IT Disaster ...
1
1
Sebastián de Durana's profile photo
Add a comment...

JM Hipolito

Security  - 
 
Car hacking is a reality the general public will have to deal with. Nothing can be as intrusive and dangerous as strangers taking over your car while you are driving it. Last week, Valasek and Miller’s digital car-jacking stunt using 3G connectivity on a Jeep Cherokee’s infotainment system illustrated how life-threatening this situation can get. The discovery of the bug has since led to the recall of of 1.4 million vehicles. A similar hack—but off-road this time—was also demonstrated a few days after, but this time via digital audio broadcasting (DAB) radio signals.
Car hacking is a reality the general public will have to deal with. Nothing can be as intrusive and dangerous as strangers taking over your car while you are driving it. Last week, Valasek and Miller’s digital car-jacking stunt using 3G connectivity on a Jeep Cherokee’s infotainment system illustrated how life-threatening this situation can get. The discovery of the bug has since led to the recall of of 1.4 million vehicles. A similar hack—but of...
5
1
Michael John Encarnación's profile photo
Add a comment...
 
One #Cyber Mistake Causes Problem$ http://oversitesentry.com/?p=2526  test #cybersecurity our computers not built for security 
All it takes is one patch is missed, One computer not taken care of. Computers must be patched so that Zero-day exploits have minimal affects. We discussed this on July 20th http://oversitesentry.com/why-security-news-scrutinized-to-nth-degree/. Let's review: vulnerability-attacktimeline ...
2
Add a comment...
 
Do you have a travel security program?
Travel security should not be taken lightly, and it's up to you to make sure your devices and networks are safeguarded wherever you are.
6
2
Shaun Griffith's profile photoAitzaz Haider's profile photo
Add a comment...

Patrick Bay

Security  - 
 
 
"...researchers in Israel have devised a new method for stealing data that bypasses all of these protections—using the GSM network, electromagnetic waves and a basic low-end mobile phone. The researchers are calling the finding a “breakthrough” in extracting data from air-gapped systems and say it serves as a warning to defense companies and others that they need to immediately “change their security guidelines and prohibit employees and visitors from bringing devices capable of intercepting RF signals,” says Yuval Elovici, director of the Cyber Security Research Center at Ben-Gurion University of the Negev, where the research was done.

The attack requires both the targeted computer and the mobile phone to have malware installed on them, but once this is done the attack exploits the natural capabilities of each device to exfiltrate data. Computers, for example, naturally emit electromagnetic radiation during their normal operation, and cell phones by their nature are “agile receivers” of such signals. These two factors combined create an “invitation for attackers seeking to exfiltrate data over a covert channel,” the researchers write in a paper about their findings.

The research builds on a previous attack the academics devised last year using a smartphone to wirelessly extract data from air-gapped computers. But that attack involved radio signals generated by a computer’s video card that get picked up by the FM radio receiver in a smartphone.

The new attack uses a different method for transmitting the data and infiltrates environments where even smartphones are restricted."
3
Add a comment...
 
#Security Saves From Breach Affects http://oversitesentry.com/?p=2517  #cyberrisk has too many sky is falling headlines 
I am always working on trying to explain how better security can save your company from headaches and certain disaster in the future. While also figuring out why people are just not paying attention to security in general. And as they say a picture says a thousand words.
1
Add a comment...