Cybersecurity at Thomas Nelson
356 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Rescooped by Cybersecurity at TNCC from Cyber Security & Digital Forensics
Scoop.it!

Furtim: The Ultra-Cautious Malware

Furtim: The Ultra-Cautious Malware | Cybersecurity at Thomas Nelson | Scoop.it
Furtim is the latest stealthy malware, intended to be kept undercover on the expense of hitting more targets.

Via Constantin Ionel Milos / Milos Constantin
more...
Ken Feltman's curator insight, May 23, 7:53 AM
New threat: Furtim.
Scooped by Cybersecurity at TNCC
Scoop.it!

New evil android phishing trojans empty your bank account

New evil android phishing trojans empty your bank account | Cybersecurity at Thomas Nelson | Scoop.it
New evil android phishing trojans empty your bank account
more...
No comment yet.
Scooped by Cybersecurity at TNCC
Scoop.it!

You too? Who's on the hacker hit list

You too? Who's on the hacker hit list | Cybersecurity at Thomas Nelson | Scoop.it
You don’t need to carry the keys to the enterprise network to have a malicious hacker tail you. Here’s who’s at risk and what to do about it
more...
No comment yet.
Scooped by Cybersecurity at TNCC
Scoop.it!

Cybercrime Groups More Damaging than Hackers - Fortscale

Cybercrime Groups More Damaging than Hackers - Fortscale | Cybersecurity at Thomas Nelson | Scoop.it
When you think of a hacker, one typically imagines a brilliant but sordid loner that lacks sustained motivation and is totally void of the discipline necessary to hold down a structured job. Certainly there are cyber crooks that fit that description. But lately there’s been an organizational shift among many top cybercriminals. The cybercrime industry, if I can cal
more...
No comment yet.
Scooped by Cybersecurity at TNCC
Scoop.it!

ImageMagick users beware: Multiple vulnerabilities leave servers compromised - TechRepublic

ImageMagick users beware: Multiple vulnerabilities leave servers compromised - TechRepublic | Cybersecurity at Thomas Nelson | Scoop.it
The popular image processing library ImageMagick has a number of critical vulnerabilities currently being used in the wild, allowing attackers to gain control of servers.
more...
No comment yet.
Scooped by Cybersecurity at TNCC
Scoop.it!

16 standout Android apps with fingerprint support

16 standout Android apps with fingerprint support | Cybersecurity at Thomas Nelson | Scoop.it
Take full advantage of your phone's fingerprint sensor with these genuinely useful fingerprint-ready apps.
more...
No comment yet.
Scooped by Cybersecurity at TNCC
Scoop.it!

Supreme Court approves rule change that expands FBI computer search powers

Supreme Court approves rule change that expands FBI computer search powers | Cybersecurity at Thomas Nelson | Scoop.it
The Supreme Court has adopted amendments to a rule to give judges the authority to issue warrants to remotely search computers whose locations are concealed using technology.
more...
No comment yet.
Scooped by Cybersecurity at TNCC
Scoop.it!

Empty DDoS threats deliver $100K to extortion group

Empty DDoS threats deliver $100K to extortion group | Cybersecurity at Thomas Nelson | Scoop.it
A group of cybercriminals extorted over $100,000 from companies by threatening to launch DDoS attacks against them, without even having the capability to do so.
more...
No comment yet.
Scooped by Cybersecurity at TNCC
Scoop.it!

Microsoft sues U.S. government over data gag orders

Microsoft sues U.S. government over data gag orders | Cybersecurity at Thomas Nelson | Scoop.it
Microsoft wants a federal court to invalidate part of a 1986 law that it alleged has been abused by the government when authorities demand customers' data.
more...
No comment yet.
Scooped by Cybersecurity at TNCC
Scoop.it!

Sweden's airspace shut down by Russian APT, not a solar storm

Sweden's airspace shut down by Russian APT, not a solar storm | Cybersecurity at Thomas Nelson | Scoop.it
A cyberattack launched by a Russian APT group may have jammed Sweden’s air traffic control systems.
more...
No comment yet.
Scooped by Cybersecurity at TNCC
Scoop.it!

US businesses: Start preparing for the EU's new privacy regulation - TechRepublic

US businesses: Start preparing for the EU's new privacy regulation - TechRepublic | Cybersecurity at Thomas Nelson | Scoop.it
The European Union's General Data Protection Regulation is going to have a global impact. "It is the biggest event that will take place in my lifetime as a data privacy lawyer," one expert said.
more...
No comment yet.
Scooped by Cybersecurity at TNCC
Scoop.it!

Behold the glorious future -- with the same old security

Behold the glorious future -- with the same old security | Cybersecurity at Thomas Nelson | Scoop.it
From delivery drones to implanted medical monitors, technology is about to become more incredible -- but not more secure
more...
No comment yet.
Scooped by Cybersecurity at TNCC
Scoop.it!

How one hacker exposed thousands of insecure desktops that anyone can remotely view | ZDNet

How one hacker exposed thousands of insecure desktops that anyone can remotely view | ZDNet | Cybersecurity at Thomas Nelson | Scoop.it
Badly configured software used on thousands of machines can let hackers into X-ray scanners, industrial control systems, doctors' servers storing medical records, and more.
more...
No comment yet.
Scooped by Cybersecurity at TNCC
Scoop.it!

Got privacy? If you use Twitter or a smartphone, maybe not so much

Got privacy? If you use Twitter or a smartphone, maybe not so much | Cybersecurity at Thomas Nelson | Scoop.it
The notion of online privacy has been greatly diminished in recent years, and just this week two new studies confirm what to many minds is already a dismal picture.
more...
No comment yet.
Rescooped by Cybersecurity at TNCC from New Technologies in Law Enforcement
Scoop.it!

'This is just the beginning' Anonymous hackers take down nine banks in 30-day cyber attack - Express.co.uk

'This is just the beginning' Anonymous hackers take down nine banks in 30-day cyber attack - Express.co.uk | Cybersecurity at Thomas Nelson | Scoop.it
Express.co.uk 'This is just the beginning' Anonymous hackers take down nine banks in 30-day cyber attack Express.co.uk The cyber attackers said in a statement to AnonHQ.com: “This is just the beginning.
Via Marc Van den Broeck
more...
Ken Feltman's curator insight, May 18, 7:45 AM
Can they be stopped?
Scooped by Cybersecurity at TNCC
Scoop.it!

Takeaways from the 2016 Verizon Data Breach Investigations Report

Takeaways from the 2016 Verizon Data Breach Investigations Report | Cybersecurity at Thomas Nelson | Scoop.it
Here are some important takeaways from the 2016 Verizon Data Breach Investigations Report (DBIR).
more...
No comment yet.
Scooped by Cybersecurity at TNCC
Scoop.it!

LAPD hacks iPhone 5s, proves they don't need Apple backdoor - TechRepublic

LAPD hacks iPhone 5s, proves they don't need Apple backdoor - TechRepublic | Cybersecurity at Thomas Nelson | Scoop.it
The LAPD recently hacked into an iPhone 5s involved in a very public murder trial. This news could prove a potential roadblock for backdoor legislation.
more...
No comment yet.
Rescooped by Cybersecurity at TNCC from Cyber Security & Digital Forensics
Scoop.it!

Whaling: Tracing the Evolution of Phishing Attacks

Whaling: Tracing the Evolution of Phishing Attacks | Cybersecurity at Thomas Nelson | Scoop.it
When you come right down to it, whaling is exactly the same as spear-phishing. The only difference is the size of the targets. They are much bigger.

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Cybersecurity at TNCC from SME Cyber Security
Scoop.it!

How One Cybercrime Gang Is Ratcheting Up PoS Attacks

How One Cybercrime Gang Is Ratcheting Up PoS Attacks | Cybersecurity at Thomas Nelson | Scoop.it
With magnetic-stripe payment card transactions gradually starting to disappear in the US, cybercriminals have been on a tear with PoS attacks against retail and hospitality targets that haven't yet adopted EMV card payment, FireEye researchers say.
Via Roger Smith
more...
Ken Feltman's curator insight, May 1, 9:13 AM
Cyber criminals try to stay ahead of the latest protection technology.
Constantin Ionel Milos / Milos Constantin's curator insight, May 2, 2:33 AM
Share your insight
Scooped by Cybersecurity at TNCC
Scoop.it!

With Finality, F.B.I. Opts Not to Share iPhone-Unlocking Method

With Finality, F.B.I. Opts Not to Share iPhone-Unlocking Method | Cybersecurity at Thomas Nelson | Scoop.it
The bureau said that it would not ask for a review of the tactics used to break into the iPhone of a San Bernardino, Calif., attacker.
more...
No comment yet.
Scooped by Cybersecurity at TNCC
Scoop.it!

Senate anti-encryption bill is itself a threat to national security | ZDNet

Senate anti-encryption bill is itself a threat to national security | ZDNet | Cybersecurity at Thomas Nelson | Scoop.it
The proposed Burr-Feinstein anti-encryption bill would put every American at risk of being spied on by foreign nations, hackers, or even the next US president.
more...
No comment yet.
Scooped by Cybersecurity at TNCC
Scoop.it!

House Judiciary Panel passes Email Privacy Act 28-0

House Judiciary Panel passes Email Privacy Act 28-0 | Cybersecurity at Thomas Nelson | Scoop.it
The House Judiciary Committee today passed the Email Privacy Act (H.T.699) by a 28-0 vote, a measure that would require a warrant for accessing anyone’s electronic correspondence.
more...
No comment yet.
Rescooped by Cybersecurity at TNCC from The Political Side of Things
Scoop.it!

Cyber-criminals becoming increasingly professional

Cyber-criminals becoming increasingly professional | Cybersecurity at Thomas Nelson | Scoop.it

Cyber-criminals targeting the UK are becoming increasingly professional and have a sophistication almost on par with nation-state hackers, according to a recently published report.


According to Symantec's annual Internet Security Threat Report (ISTR), there has also been an increase of 125 percent in zero-day vulnerabilities globally, with half a billion records lost as a result of data breaches.


The report also ranked the UK as the most targeted nation for spear-phishing attacks, and second most targeted nation with social media scams. The country was also ranked as third most targeted nation for ransomware.


According to the report, criminals are adopting corporate best practices and establishing professional businesses to increase the efficiency of their attacks against enterprises and consumers.


Via Ken Feltman
more...
Ken Feltman's curator insight, April 14, 6:11 AM
Our image of cyber criminals needs updating.
Scooped by Cybersecurity at TNCC
Scoop.it!

Facebook Account Kit opens door to a world without passwords

Facebook Account Kit opens door to a world without passwords | Cybersecurity at Thomas Nelson | Scoop.it
Developers and site owners can use Facebook's latest SDK to remove passwords from the login process
more...
No comment yet.
Scooped by Cybersecurity at TNCC
Scoop.it!

Hackers offering bulk discount to unlock encrypted MedStar data

Hackers offering bulk discount to unlock encrypted MedStar data | Cybersecurity at Thomas Nelson | Scoop.it
The hackers who locked up data on MedStar's computers this week are demanding ransom to begin unlocking it — and they're offering a bulk discount to release all of it, according to a copy of the demands obtained by the Baltimore Sun.
more...
No comment yet.