SME Cyber Security
79.7K views | +3 today
Follow
 
Scooped by Roger Smith
onto SME Cyber Security
Scoop.it!

Hacker May Have Punched Through FBI Cyber Security With One Phone Call

Hacker May Have Punched Through FBI Cyber Security With One Phone Call | SME Cyber Security | Scoop.it

It doesn’t matter how technically secure your data is if it’s protected by gullible humans.

more...
OnPage.com / Critical Alerts's curator insight, February 11, 9:48 AM

The departments of Justice and Homeland Security are investigating a Justice hack allegedly made possible by the enemy of secure logins—IT support.

 

OnPage.com

OnPage.com / Critical Alerts's curator insight, May 9, 4:06 PM

OnPage.com

SME Cyber Security
Your new post is loading...
Your new post is loading...
Scooped by Roger Smith
Scoop.it!

Mobile Device Security in the Workplace: 6 Key Risks & a Surprising Challenge

Mobile Device Security in the Workplace: 6 Key Risks & a Surprising Challenge | SME Cyber Security | Scoop.it
Employees aren't just bringing their mobile devices to the workplace—they're living on them. A recent study by Pew Research found that 44 percent of smartphone owners sleep with their...
Roger Smith's insight:

Recently played with this in a controlled manger but I was impressed how easy it was to compromise a smart device!

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Public Wi-Fi Security – How to avoid this triple threat while surfing on the go – Digital Privacy | Cyber Security & Digital Forensics

Public Wi-Fi Security – How to avoid this triple threat while surfing on the go – Digital Privacy | Cyber Security &  Digital Forensics | SME Cyber Security | Scoop.it
RT @FreedomeVPN: Read how to avoid also the most dangerous public Wi-Fi hack, the pesky packet sniffer https://t.co/dNUuq3oZ8I https://t.co… | Cyber Security & Digital Forensics
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Slovenian hacker who reported issues in Tetra Protocol gets prison sentence

Slovenian hacker who reported issues in Tetra Protocol gets prison sentence | SME Cyber Security | Scoop.it
A Slovenian student who reported configuration errors in the Tetra protocol used by the local Police gets a prison sentence.
Roger Smith's insight:

Sorry, but if someone finds a hole in an organisations digital security, informs the organisation of same hole and they do nothing for three years, the organisation is guilty.  


 


Yes the hacker did it wrong, but where is the culpability of the organisation in protecting  their assets.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Microsoft warns of malicious macros using a new sneaky trick

Microsoft warns of malicious macros using a new sneaky trick | SME Cyber Security | Scoop.it
Researchers at the Microsoft’s Malware Protection Center are warning of a new wave of attacks leveraging malicious macros using a new sneaky trick.
Roger Smith's insight:

Coming round again?

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

A third bank was a victim of cyber heist that involved the SWIFT

A third bank was a victim of cyber heist that involved the SWIFT | SME Cyber Security | Scoop.it
The Ecuador Bank Banco Del Austro of Cuenca was hacked by threat actors that once again involved the SWIFT systems to stole $12 Million.
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Anti-cyber crime chiefs want more businesses to report data attacks

Anti-cyber crime chiefs want more businesses to report data attacks | SME Cyber Security | Scoop.it
Headline Anti-cyber crime chiefs want more businesses to report data attacks
Roger Smith's insight:

When you report it you are then liable.   Being liable exposes the organisation to bigger risk that not reporting it.   Most SME base their decision on that risk.  


Working out that exposure to the risk in monitory value is what drives the reporting process.   Being able to report digital crime without exposure to risk and in some way staying anonimous are important parameters for this to work.


This is one of the natures of the digital world and business.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

5 Tips for Protecting Firmware From Attacks

5 Tips for Protecting Firmware From Attacks | SME Cyber Security | Scoop.it
Don't let hackers take advantage of holes in firmware. Here's how to stop them.
Roger Smith's insight:

A noticable problem for hospitals, libraries and the like


 


"hackers attack firmware because they know many security and IT managers aren’t paying attention to it. "

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

You are what you click: Online search security risks - Help Net Security

You are what you click: Online search security risks - Help Net Security | SME Cyber Security | Scoop.it
Online search security risks are on the rise. When it comes to the desire for the ideal body, people may be willing to sacrifice their online security.
Roger Smith's insight:

search is another vector for the digital criminal.   They understand SEO better than most.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Ransomware: Putting Companies Between A Rock And A Hard Place

Ransomware: Putting Companies Between A Rock And A Hard Place | SME Cyber Security | Scoop.it
Paying a ransom encourages more attacks, but sometimes not paying could end up being a lot costlier
Roger Smith's insight:

This is why risk management, business continuity and disaster recovery is so important to any and all organisations.  Just the simple phrase 


BACK IT UP REGULARLY should be shouted from the rooftops


 

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Is your business prepared for the next cyber breach? – Hacking Insider

Is your business prepared for the next cyber breach? – Hacking Insider | SME Cyber Security | Scoop.it
more...
Ken Feltman's curator insight, May 22, 11:45 AM
It's just a matter of time before everyone has been hacked.
Scooped by Roger Smith
Scoop.it!

Cybersecurity special report: Ransomware will get worse, hackers targeting whales, medical devices and IoT trigger new vulnerabilities

Cybersecurity special report: Ransomware will get worse, hackers targeting whales, medical devices and IoT trigger new vulnerabilities | SME Cyber Security | Scoop.it
Cybercriminals have set their sights on healthcare. Ransomware is the new normal. And many providers are approaching security all wrong. CIOs, CISOs, ethical hackers and other experts point the way forward.
Roger Smith's insight:

A little doom and gloom for your your Wednesday afternoon

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

5 Cybersecurity Threats Businesses Should Watch Out for in 2016

5 Cybersecurity Threats Businesses Should Watch Out for in 2016 | SME Cyber Security | Scoop.it
Experts forecast a continuation of past trends in 2016 with the global cybercrime industry growing to $600 billion a year.
Roger Smith's insight:

it is already looking like 2016 will be the worst year for digital security.   Doing the fundamentals gives you a fighting chance.


 

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Criminals Planting Keyloggers On Smartphones

Criminals Planting Keyloggers On Smartphones | SME Cyber Security | Scoop.it
Security experts warn the devices are increasingly being targeted by hackers covertly installing viruses that steal personal data.
Roger Smith's insight:

This is not a prediction, this is happening now.   Although the IOS systems supported by Apple are relatively safe, the android operating system is riddled with holes and with more than 1 billion users are a prime target for the digital criminal.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

How to stop your phone from being hacked

How to stop your phone from being hacked | SME Cyber Security | Scoop.it
How to stop your phone from being hacked - Advices from a cyber forensics investigator https://t.co/2H4iypEVBX https://t.co/PseOj3Axia
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Is there life after antivirus? Looking to the future of endpoint protection | Information Age

Is there life after antivirus? Looking to the future of endpoint protection | Information Age | SME Cyber Security | Scoop.it
Many are moving away from antivirus solutions and embracing new technologies to protect their endpoints, but what's next after antivirus?
Roger Smith's insight:

What is the next step in detection and prevention of malware?  

more...
Ken Feltman's curator insight, May 25, 7:52 AM
Can we stay ahead of hackers?
Scooped by Roger Smith
Scoop.it!

Bad Botnets Threaten Security | PYMNTS.com

Bad Botnets Threaten Security | PYMNTS.com | SME Cyber Security | Scoop.it
Malicious botnets represent a threat to consumer security.
Roger Smith's insight:

Bad robot!

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Cybercrime on the rise as economic crime 'goes digital'

Cybercrime on the rise as economic crime 'goes digital' | SME Cyber Security | Scoop.it
Incidents of cybercrime are on the rise, with a new study from PwC reporting it as the “only economic crime to have registered an increase”.
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Bank Of America Will Let You Withdraw Cash Using Android Pay At 5,000 ATMs By The End Of This Year

Bank Of America Will Let You Withdraw Cash Using Android Pay At 5,000 ATMs By The End Of This Year | SME Cyber Security | Scoop.it
Mobile payments are often viewed as a replacement for cash and cards. Why carry layers of bills and plastic in your wallet when you can simply make purchas... by Bertel King, Jr.
Roger Smith's insight:

Making it easy for consumers is constantly exposing them to the ability for them to be compromised.   I do not know the technology to be deployed but We already have card skimmers that look exacly like the real parts of the ATM's what to stop them putting a NFC reader in it as well.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

How Social Media Jeopardizes Data Security

How Social Media Jeopardizes Data Security | SME Cyber Security | Scoop.it
Your employees may be revealing too much, here's how to keep their posts from compromising your business.
Roger Smith's insight:

In the 70's to the 90's social engineering was dumpster diving and going through the trash.   In the last 10 years the digital criminal has embraced social media as the go to area for personal information when conducting a social engineering attack.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

NSA whistleblower Snowden: Google Allo without default encryption is 'dangerous' | ZDNet

NSA whistleblower Snowden: Google Allo without default encryption is 'dangerous' | ZDNet | SME Cyber Security | Scoop.it
While NSA whistleblower Edward Snowden weighs into Allo controversy, Google 'cyber overlord' Thai Duong argues end-to-encryption is nice but what people really want is disappearing messages.
Roger Smith's insight:

A bit unusual coming from the Google stable where encryption is king

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Are businesses overlooking risks away from cybercrime? | Information Age

Are businesses overlooking risks away from cybercrime? | Information Age | SME Cyber Security | Scoop.it
While highlighting cyber risk is important, a holistic view of the business is needed to ensure the right judgement calls are being made
Roger Smith's insight:

A competent risk manager looks at risk to the organisation.  The qualification of those risks happens further down the process and most risk managers know this.  


 


Cybersecurity and digital crime are just like anything else, a risk to the business that has to be mitigated with the right checks and balances.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Luma Makes Your Home Wi-Fi Smart, Secure, and Somehow Fun

Luma Makes Your Home Wi-Fi Smart, Secure, and Somehow Fun | SME Cyber Security | Scoop.it
With a three-pack of little hexagons, Luma turns your home into a far-reaching mesh network with fun-to-use controls.
Roger Smith's insight:

The first problem with this type of technology is 


"Once setup is done, your Lumas will “find” one another, form a mesh network"


It is human nature to make it easy, not think it through and not change defaults.   This system is still relying on people - we are all stupid

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Why Online Video Gaming Will Be The Next Industry Under Cyber Attack

Why Online Video Gaming Will Be The Next Industry Under Cyber Attack | SME Cyber Security | Scoop.it
As more money flows into games, criminals are targeting this new and lucrative market with the tools and techniques they once used to hack online banks and Internet retailers.
Roger Smith's insight:

? So the Sony PlayStation network and the Xbox Christmas hack wasn't a cyber attack.  This is news to me.


 


if it is digital it is a target


 


if it is connected to the Internet it is a target

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Why your cyber security team should include a psychologist - Business Reporter

Why your cyber security team should include a psychologist - Business Reporter | SME Cyber Security | Scoop.it
A psychologist might not be the first recruit business leaders have in mind when building a cyber security team, but they have a lot to offer when it comes
Roger Smith's insight:

Interesting spin on cybercrime, but it would be better to get people who think like criminals to do the attacking and defending. Most of the problems of digital crime is that of understanding the bad guys, their strategies and tactics.

more...
No comment yet.