SME Cyber Security
83.5K views | +0 today
Follow
 
Scooped by Roger Smith
onto SME Cyber Security
Scoop.it!

How Social Media is an Online Privacy Risk for You [INFOGRAPHIC]

How Social Media is an Online Privacy Risk for You [INFOGRAPHIC] | SME Cyber Security | Scoop.it
The sites you use to connect to family and friends can also compromise sensitive information - so this is how you can be careful with them.
Roger Smith's insight:

Here be some frightening stats!

more...
Krzysztof Rybak's curator insight, January 19, 2015 5:37 PM

Kolejny artykuł ostrzegający przed socialmediami, niestety ludzie nie zdają sobie sprawy jak bardzo wystawieni są na niebezpieczesntwa w internecie. 

Brittany Monroe's curator insight, February 15, 2015 10:18 AM

#PRIVACY

SME Cyber Security
Your new post is loading...
Your new post is loading...
Scooped by Roger Smith
Scoop.it!

Marriott CFO calls $1B estimate on cyber breach premature

Marriott CFO calls $1B estimate on cyber breach premature | SME Cyber Security | Scoop.it
It’s too soon for Marriott International Inc. to estimate the cost of the massive cyber breach that the company disclosed last week, said Chief Financial Officer Leeny Oberg.
Roger Smith's insight:

This will show the teeth of GDRP.   The impact will be eventful.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

77% of Multinational Firms Are Not Ready To Get Hacked, Says IBM

77% of Multinational Firms Are Not Ready To Get Hacked, Says IBM | SME Cyber Security | Scoop.it
IBM Resilient and found that 77 percent of respondents admit they do not have a formal cyber security incident response plan (CSIRP) applied consistently across their organization.
Roger Smith's insight:

Nothing new here!

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Dark web websites: 10 things you should know

Dark web websites: 10 things you should know | SME Cyber Security | Scoop.it
Screenshots offer a glimpse of what flourishes in the shadows of the internet...
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Cyber crooks exploit cardless ATMs using … are duping bank customers through SMS phishing and cardless ATM technology

Cyber crooks exploit cardless ATMs using … are duping bank customers through SMS phishing and cardless ATM technology | SME Cyber Security | Scoop.it
Cardless ATMs exploited by a combination of phishing and adding new numbers to customers' mobile accounts...
Roger Smith's insight:

NFC not the cure all.   It is amasing the availability of tools and systems that allow criminals to steal money from both cards and phones.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Everyone needs to take responsibility for cybersecurity in the workplace

Everyone needs to take responsibility for cybersecurity in the workplace | SME Cyber Security | Scoop.it
It’s important that employees in every industry, from sales assistants to CEOs, are aware of potential threats and have a clear understanding of how to handle them...
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

WhatsApp Users Warning! Your chats may be read by others; this 'Indian' malware can hack even your passwords

WhatsApp Users Warning! Your chats may be read by others; this 'Indian' malware can hack even your passwords | SME Cyber Security | Scoop.it
WhatsApp users, your chat poses a big threat to your privacy. Others may actually get to read your private chats!
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Hackers as Heroes: How Ethical Hacking is Changing the Industry

Hackers as Heroes: How Ethical Hacking is Changing the Industry | SME Cyber Security | Scoop.it
Hackers are often portrayed in movies as outsiders who use their computer skills to inflict harm and commit crime.
Roger Smith's insight:

Offensive security, using the strategies and tactics of the criminal to increase awareness and close holes in the system.  A very good way of verifying your scurity systems

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Spies still super upset they can't get at your encrypted comms data • The Register

Spies still super upset they can't get at your encrypted comms data • The Register | SME Cyber Security | Scoop.it
Five Eyes to tech: We have ways of making you comply
Roger Smith's insight:

You can not have it both ways, you either weaken encryption and no one is safe or you enforce encrytion and everyone is safe.   Just more government mumbo jumbo to confuse the issue.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

British police are on the brink of a totally avoidable cybercrime crisis

British police are on the brink of a totally avoidable cybercrime crisis | SME Cyber Security | Scoop.it
Police cuts were justified with an alleged decline in crime. But crime just moved online
Roger Smith's insight:

"#Cybercrime is not like any other kind of crime. Perpetrators are elusive; arrests are rare; stolen goods are immaterial assets, such as #data, #cryptocurrency, personal information.

It straddles borders and legal jurisdictions, with victim and criminal often residing in different countries, and only communicating through encrypted messages and bitcoin transactions. The public is barely aware of its pervasiveness — but it has been steadily on the rise for years. National police forces worldwide are scrambling to mount an effective defence, but what are the chances of success? "Carl Miller

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Telstra Data Breach - A Website Error Exposed Customers' Information Online

Telstra Data Breach - A Website Error Exposed Customers' Information Online | SME Cyber Security | Scoop.it
A website flaw resulted in Telstra data breach reported by a non-technical user. The site showed thousands of customers' details online in search results.
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Use These Frameworks to Establish GDPR Security Controls

Use These Frameworks to Establish GDPR Security Controls | SME Cyber Security | Scoop.it
When it comes to complying with the General Data Protection Regulation (GDPR), a common struggle organizations face is how to establish “what right looks like” in the absence of a checklist or prescriptive instructions.
Roger Smith's insight:

Any framework will do it, or a combination of a number of them, but FFS just start somewhere.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

OK, We Are Bad At Cybersecurity -- Now What?

OK, We Are Bad At Cybersecurity -- Now What? | SME Cyber Security | Scoop.it
Here's how we can help avoid self-inflicted cybersecurity wounds.
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

A new malware, an old flaw, and social media as a weapon | Avast

A new malware, an old flaw, and social media as a weapon | Avast | SME Cyber Security | Scoop.it
Smoke Loader uses a new injection technique, Hamas uses social engineering on IDF, and a Facebook bug causes unblocking.
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Australia Passes Anti-Encryption Bill—Here's Everything You Need To Know

Australia Passes Anti-Encryption Bill—Here's Everything You Need To Know | SME Cyber Security | Scoop.it
Here's Everything You Need To Know About Australia's New "Telecommunications Assistance and Access Bill 2018," also known as the Anti-Encryption Bill...
Roger Smith's insight:

The blantant stupidity of the Australian parliament shows they have no understanding of the requirements of encryption for everyday use of the digital world.  


This will have far reaching and catastrophic impact on the Australian digital sector and if not changed in the near future will have the multinational software companys removing their support and business from Australia.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Bug Bounty Hackers Bill Introduced into the US Senate – Cyber Defense Magazine

Bug Bounty Hackers Bill Introduced into the US Senate – Cyber Defense Magazine | SME Cyber Security | Scoop.it
A bipartisan pair of US Senators introduced a bill that would require the US Department of Homeland Security to create an ongoing program to allow security experts to report bugs on agency websites. The Public-Private Cybersecurity Cooperation Act, introduced Thursday by Sen. Rob Portman, R-Ohio, and Maggie Hassan, D-N.H., requires Homeland Security to create a vulnerability disclosure program so hackers can report problems they find to the proper authorities without being prosecuted for breaking laws like the 1986 Computer Fraud and Abuse Act. “This bill encourages ethical hackers to come forward with information they find about vulnerabilities in our government networks by assuring them that if they do, they’ll have protection under the law,” Hassan said in a statement. If enacted, Homeland Security would develop a remediation process to address any reported bugs and present annual reports tracking how many are reported, how many are fixed and how long it’s taking between a flaw being reported and being fixed. Congress also wants to know how many people or organizations participate. “As a long time former member of the MITRE CVE (OVAL) advisory board in the support of the National Vulnerability Database, housed at NIST, I believe this is an important step in helping to better harden our many exploitable government networks,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine. The bill is a companion piece to House version sponsored by Majority Leader Kevin McCarthy, R-Calif, which passed in late September. The Senate already passed another cybersecurity bill from Portman and Hassan called the Hack the Department of Homeland Security Act. That bill would also encourage outside security researchers to report vulnerabilities to the agency, but in scheduled bug bounty competitions. The Hack DHS Act is still waiting on House action. Sources: NextGov and Senate.gov
Roger Smith's insight:

This is a good idea!

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Mirai 'botmasters' now exploiting Hadoop flaw to target Linux servers

Mirai 'botmasters' now exploiting Hadoop flaw to target Linux servers | SME Cyber Security | Scoop.it
Malware used to take half the internet offline is being used to build powerful botnets with just a handful of compromised servers...
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Why business can't keep the public safe from data breaches

Why business can't keep the public safe from data breaches | SME Cyber Security | Scoop.it
Cyber-threats pose an existential challenge, says RedSeal CEO Ray Rothrock.
Roger Smith's insight:

Eggs in one basket and all of that.   Single solutions do not work, frameworks will.   No silver bullet solutions generated by knee jerk reactions.   


SME’s need to look at holistic solutions that involve people, policy and technology.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Australia has to work together to stay ahead of cyber threats - CSO | The Resource for Data Security Executives

Australia has to work together to stay ahead of cyber threats - CSO | The Resource for Data Security Executives | SME Cyber Security | Scoop.it
By Steve Moros, Director of Cyber Security, Cisco Australia and New Zealand.
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Trump’s new cyber strategy seeks global dominion over internet — RT US News

Trump’s new cyber strategy seeks global dominion over internet — RT US News | SME Cyber Security | Scoop.it
Setting the global standard for online behavior, preserving American dominance, political and economic interests, punishing ‘malicious actors’ like Russia and China: these are the ambitious goals of the new US cyber-strategy.
Roger Smith's insight:

Interesting

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Cybersecurity Vulnerabilities Found In New Medical Devices | King & Spalding - JDSupra

Critical security flaws have been discovered in two widely-used medical devices, according to a disclosure by the IT consulting firm CyberMDX. Working closely with the device...
Roger Smith's insight:

Its not just about computers and mobile phones, any digital device can be hacked through vulnerabilities in its systems.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

No, eight characters, some capital letters and numbers is not a good password policy • The Register

No, eight characters, some capital letters and numbers is not a good password policy • The Register | SME Cyber Security | Scoop.it
Western Oz infosec audit report was shocking, but only 'cos it made public
Roger Smith's insight:

This makes for some really bad reading, my take away though is what the hell were the ICT and Business security people doing to allow this to happen?


 


From the results - not much

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Govt finally reveals how it plans to target encryption - Security - Telco/ISP

Govt finally reveals how it plans to target encryption - Security - Telco/ISP | SME Cyber Security | Scoop.it
Will involve weakening the security of services.
Roger Smith's insight:

What a load of crap - "The mere fact that a capability to selectively assist agencies with access to a target device exists will not necessarily mean that a systemic weakness has been built," the government argued

 

This is not weakening encryption? - " “The Australian government has no interest in undermining systems that protect the
fundamental security of communications,” it said." 

 

This will impact the other 99.999% of the users of the digital world

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

For just $10, a hacker can attack your business via RDP: Here's how to stay safe

For just $10, a hacker can attack your business via RDP: Here's how to stay safe | SME Cyber Security | Scoop.it
RDP access is being used as an entryway for hackers. Be careful yours doesn't end up for sale on the Dark Web.
Roger Smith's insight:

If you are using RDP to access your organisation you need to make it more secure. 

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Hacker Compromises Air Force Captain to Steal Sensitive Drone Info

Hacker Compromises Air Force Captain to Steal Sensitive Drone Info | SME Cyber Security | Scoop.it
The thief also had a second dataset, including the M1 Abrams maintenance manual, a tank platoon training course, a crew survival course and documentation on improvised explosive device (IED) mitigation tactics.
Roger Smith's insight:

Social enginering!

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

The Biggest Risk to Your Business: Inadequate Cybersecurity

The Biggest Risk to Your Business: Inadequate Cybersecurity | SME Cyber Security | Scoop.it
You wouldn't leave the doors to your business unlocked overnight, so why would you consider taking risks when it comes to your cybersecurity?
more...
No comment yet.