"Customers should pay close attention (to) their own security and take security into consideration when selecting a service bureau and working with other third-party providers,” SWIFT, also known as the Society for Worldwide Interbank Financial Telecommunication, said in a press release published on its website. via SWIFT warns on vendor security after documents leaked by … Continue reading Vendors pose a security risk says SWIFT
Author: j4vv4d
Stop calling it a cyberattack!
Cyberattacks — “We had one of our top cyberattack experts at AP talk to us. They were unanimous that the word is greatly overused for things like hacking. We caution that the word cyberattack should be used only for significant and widespread destruction,” Froke said. via AP style for first time allows use of they as … Continue reading Stop calling it a cyberattack!
When disclosure is responsible
What originally appeared to be one of the most damaging releases in recent memory of "zero-day" exploits, or hacking tools that take advantage of previously unknown software vulnerabilities, fell from the sky with the shrieking ferocity of a MOAB bomb and landed with the soft thud of a dud. via Microsoft's Quiet Patch of Shadow … Continue reading When disclosure is responsible
Dallas emergency sirens set off
Last Friday night, as midnight approached, someone managed to trigger the emergency siren system used by the city of Dallas for tornado warnings and other emergencies. And that someone managed to keep the alarms in action for 95 minutes—even after emergency services workers shut them off. The entire system had to be shut down. via Pirate … Continue reading Dallas emergency sirens set off
GDPR Mind Map
I've been reading up on GDPR lately and frequently use mind maps to organise my thoughts. So, I thought I'd share the interactive mind map I created for GDPR with its 11 chapters, 99 articles and 187 recitals. Let me know if I've missed anything or should amend for clarity. https://my.mindnode.com/wFYSWkLzBGcBBbtwX3zYr8aysiyxaNGMR5qEwMmq/em#74,29,2
Privacy: Take control
There's a lot going on in the world about governments snooping on citizens, and hacker groups trying to gain control over your facebook. While these are genuine concerns, it probably shouldn't be the biggest worry for most citizens. It is always easier to point the finger at a boogeyman, and blame all your woes on … Continue reading Privacy: Take control
Stop hackers with these 6 simple steps! (Number 3 will shock you).
Hackers are everywhere, but they're not content with just hacking into banks and stealing the money. They are after you too. Once they get access to your facebook or email account, they can read all your private messages, send out rude messages that claim to be from you, and generally ruin your life. Often they … Continue reading Stop hackers with these 6 simple steps! (Number 3 will shock you).
SHA1 collision – What’s it all about?
Why should we be concerned about the successful SHA-1 collision attack that was recently demonstrated by Google researchers? I take a look at encryption, cryptographic hashing, and why this attack is a big deal.
Flashpoint, shining a light on threat intelligence from the dark web
New York-based Flashpoint was founded in 2010, and has evolved its mission to comb the dark web to provide business risk intelligence to help organizations mitigate risk across the enterprise. The company is headed up by CEO Josh Lefkowitz, with Evan Kohlmann and Josh Devon serving as chief innovation officer, and chief operating officer respectively. … Continue reading Flashpoint, shining a light on threat intelligence from the dark web
The 2016 Alien Eye In the Sky Recap
Today is the last Alien Eye in The Sky episode for 2016, so rather than just recapping the week, we thought we’d take a look at what’s transpired over the course of 2016. To be honest, I underestimated the huge task at hand, and after researching several hundred breaches, decided that it was better to … Continue reading The 2016 Alien Eye In the Sky Recap
