Cyber Security and Defense
1.7K views | +0 today
Cyber Security and Defense
Anything related to cyber and computer security
Curated by Fang Feng
Your new post is loading...
Your new post is loading...
Scooped by Fang Feng
Scoop.it!

Everyone Is Falling For This Frighteningly Effective Gmail Scam

Everyone Is Falling For This Frighteningly Effective Gmail Scam | Cyber Security and Defense | Scoop.it
Security researchers have identified a "highly effective" phishing scam that fools Google Gmail customers into divulging their passwords.
Fang Feng's insight:
Be aware of such a scam.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Symantec revokes faulty security certificates | ZDNet

Symantec revokes faulty security certificates | ZDNet | Cyber Security and Defense | Scoop.it
The cybersecurity firm has once again been left red-faced after issuing insecure certificates.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

10 Best Popular Password Cracking Tools Of 2016 | Windows, Linux, OS X

10 Best Popular Password Cracking Tools Of 2016 | Windows, Linux, OS X | Cyber Security and Defense | Scoop.it
Here we make a list of the best top 10 password cracking tools that are widely used by ethical hackers and cyber security experts.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Will CryptXXX Replace TeslaCrypt After Ransomware Shakeup? - TrendLabs Security Intelligence Blog

Will CryptXXX Replace TeslaCrypt After Ransomware Shakeup? - TrendLabs Security Intelligence Blog | Cyber Security and Defense | Scoop.it
The departure of TeslaCrypt from the ransomware circle has gone and made waves in the cybercriminal world. Bad guys appear to be jumping ships in hopes of getting a chunk out of the share that was previously owned by TeslaCrypt. In line with this recent event, indicators are pointing to a new strong man in the ransomware game: CryptXXX.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

You Want Perfect Data Security? Dream on.

You Want Perfect Data Security? Dream on. | Cyber Security and Defense | Scoop.it
Experts speaking at the MIT Sloane CIO Symposium this week said regulations are not aiding in the war against cybersecurity threats.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

7 Ways Cloud Computing Propels IT Security - InformationWeek

7 Ways Cloud Computing Propels IT Security - InformationWeek | Cyber Security and Defense | Scoop.it
A spate of high-profile public and private cloud security breaches is helping to push advancements in security such as encryption. Here's a look at 7 ways the cloud may be the largest driver of IT security today.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Something called 'Google dorking' helps hackers find out stuff no one wants them to know

Something called 'Google dorking' helps hackers find out stuff no one wants them to know | Cyber Security and Defense | Scoop.it
"Google dorking" involves using Google's advanced search techniques to dig up information on the internet that doesn't easily pop up during a normal search.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Learn More About Information Security with Hack2Secure

Learn More About Information Security with Hack2Secure | Cyber Security and Defense | Scoop.it
Press Release issued Mar 18, 2016: According to a report by The Times of India Tech, 7 out of 10 hacking attacks are done through web applications. Some key findings of the report states that 155 .gov and .nic domains were hacked in 2014.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

InfoSec Handlers Diary Blog - Why Users Fall For Ransomware

SANS Internet Storm Center - A global cooperative cyber threat / internet security monitor and alert system. Featuring daily handler diaries with summarizing and analyzing new threats to networks and internet security events.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Five things you need to know about ransomware

Five things you need to know about ransomware | Cyber Security and Defense | Scoop.it
Ransomware has become a real scourge for consumers, businesses and even government institutions. Unfortunately, there's no end in sight, so here's what you should know.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

CIOs admit they are blind to cyber threats despite security spend

CIOs admit they are blind to cyber threats despite security spend | Cyber Security and Defense | Scoop.it
Many of the security defences that companies invest in are blind to encrypted traffic and untrustworthy digital certificates, a study reveals
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

What Is the Best Way to Secure Endpoints?

What Is the Best Way to Secure Endpoints? | Cyber Security and Defense | Scoop.it
The goal of security staffs has gotten harder to fulfill: Protect the devices that hold critical data and offer ways into an organization.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Symantec caught once again improperly issuing illegitimate HTTPS certificates - ExtremeTech

Symantec caught once again improperly issuing illegitimate HTTPS certificates - ExtremeTech | Cyber Security and Defense | Scoop.it
Symantec has once again been caught issuing faulty HTTPS certificates for
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Someone is learning & practicing how to take down the Internet

Someone is learning & practicing how to take down the Internet | Cyber Security and Defense | Scoop.it
This is serious and genuinely alarming. Bruce Schneider is an expert in cyber-security, the Chief Technology Officer of Resilient, an IBM Company, a fellow at Harvard's Berkman Center, and a board member of Electronic Frontier Foundation -- an...
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

How to recover files encrypted by all Teslacrypt Ransomware variants

How to recover files encrypted by all Teslacrypt Ransomware variants | Cyber Security and Defense | Scoop.it
Experts from Cisco Talos team have improved their decryptor tool to allow the recovery of files encrypted by all the Teslacrypt Ransomware variants
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Google Starts Testing The Ability To Login Without A Password - Forbes

Google Starts Testing The Ability To Login Without A Password - Forbes | Cyber Security and Defense | Scoop.it
Google is testing a feature that lets users sign into their accounts without requiring a password. Users that have access to this feature will be able to login to their accounts using their mobile devices. A notification pops up that asks users to authenticate their identities and grant permission to [...]
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

How new malware stole millions from customers of 22 U.S. banks

How new malware stole millions from customers of 22 U.S. banks | Cyber Security and Defense | Scoop.it
Phishing and malware scams are everywhere these days -- and if you don't take the necessary steps to protect yourself, you could end up losing a lot of money.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

9 biggest information security threats through 2018 | Networks Asia

9 biggest information security threats through 2018 | Networks Asia | Cyber Security and Defense | Scoop.it
Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security threats over a...
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Learn More About Information Security with Hack2Secure

Learn More About Information Security with Hack2Secure | Cyber Security and Defense | Scoop.it
Press Release issued Mar 18, 2016: According to a report by The Times of India Tech, 7 out of 10 hacking attacks are done through web applications. Some key findings of the report states that 155 .gov and .nic domains were hacked in 2014.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Preventing DNS-based data exfiltration

Preventing DNS-based data exfiltration | Cyber Security and Defense | Scoop.it
Theft of sensitive or regulated data and intellectual property is one of the most serious risks to an enterprise. DNS is frequently used as a pathway for data
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

5 things you need to know about ransomware, the scary malware that locks away data

5 things you need to know about ransomware, the scary malware that locks away data | Cyber Security and Defense | Scoop.it
Ransomware has become a real scourge for consumers, businesses and even government institutions. Unfortunately, there's no end in sight, so here's what you should know.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

The ROI Of Infosec: 11 Dos and Don'ts For Management Buy In

The ROI Of Infosec: 11 Dos and Don'ts For Management Buy In | Cyber Security and Defense | Scoop.it
The case for a bigger bottom line depends on how well you argue that the business can't run without a specific level of security infrastructure.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

A critical security flaw affects nearly the entire internet

A critical security flaw affects nearly the entire internet | Cyber Security and Defense | Scoop.it
An eight-year-old bug in the Internet's Domain Name Service (DNS) could be used to widely spread malware, according to security research Dan Kaminsky. He says a...
more...
No comment yet.