Secure

now browsing by tag

 
 

How Hotel Cybersecurity Keeps Guests and Data Secure

Source: National Cyber Security – Produced By Gregory Evans

Hotels need cybersecurity: Although they don’t have the volume of transactions that big box retail stores do, their transactions are generally larger, and their guests have more at stake than just their groceries. But the personal information hotels store is only part of what’s at risk. Breaking Down Hotel Cybersecurity…

The post How Hotel Cybersecurity Keeps Guests and Data Secure appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

3 Cybersecurity Tech Solutions That Can Help Keep Your Small Business Secure

Source: National Cyber Security – Produced By Gregory Evans

3 Cybersecurity Tech Solutions That Can Help Keep Your Small Business Secure

Cybersecurity should be one of the most important focuses of your small business on a daily basis. If you have any sort of online presence within your organization, then you have the risk of being attacked through a myriad of possible security loopholes. Small, local businesses are also just as much at risk of cyberattacks as the big guys, especially …

The post 3 Cybersecurity Tech Solutions That Can Help Keep Your Small Business Secure appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Password tool uses neural network for secure protection from hackers

Source: National Cyber Security – Produced By Gregory Evans

Password tool uses neural network for secure protection from hackers

A state-of-the-art password meter that offers real-time feedback and advice to help people create better passwords has been developed by researchers from Carnegie Mellon University and the University of Chicago. One of the most popular passwords in 2016 was “qwertyuiop,” even though most password meters will tell you how weak that is. Many existing meters also fail to offer good …

The post Password tool uses neural network for secure protection from hackers appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

10 Ways To Secure Your Personal Data

Source: National Cyber Security – Produced By Gregory Evans

10 Ways To Secure Your Personal Data

I was recently the victim of a hack. My identity was impersonated and the information was used to steal my personal data from GoDaddy. How could this happen I asked myself? The cybercriminal got hold of my social security number, used it to locate my credit card number from my bank, then used that credit card number to access my …

The post 10 Ways To Secure Your Personal Data appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Why you shouldn’t trust the “world’s most secure” email service

To Purchase This Product/Services, Go To The Store Link Above Or Go To http://www.become007.com/store/ Source: National Cyber Security – Produced By Gregory Evans If something seems too good to be true, it probably is. In the cybersecurity world, if something is said to be “unhackable” …

The post Why you shouldn’t trust the “world’s most secure” email service appeared first on Become007.com.

View full post on Become007.com

How Do You Secure Your Kids Online?

Vigilance is a word often used when discussing parenting because the key role for any parent is to safeguard and protect your kids as best you can from the inherent dangers that life throws at them. The internet is no different.

The real world is one thing but the digital world – an ever-changing landscape – opens up your kids to a new wave of potential vulnerabilities and threats.

Instead of continually worrying about it, or worse, worrying your kids about it, my advice as a parent is to immerse yourself in the digital world, educate yourself and in-turn, educate your kids.

Read More

The post How Do You Secure Your Kids Online? appeared first on Parent Security Online.

View full post on Parent Security Online

IoT Security Flaws Must Be Addressed Immediately, Warns Secure Cloudlink

Source: National Cyber Security – Produced By Gregory Evans

IoT Security Flaws Must Be Addressed Immediately, Warns Secure Cloudlink

Passwords have not been updated to cope with an increasingly digital economy and the rise of IoT The expected growth of the global Internet of Things (IoT) market will lead to increased security risks as hackers are presented with a …

The post IoT Security Flaws Must Be Addressed Immediately, Warns Secure Cloudlink appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Clash Royale Forums Hacked but Game Accounts Still Secure

Source: National Cyber Security – Produced By Gregory Evans

Clash Royale Forums Hacked but Game Accounts Still Secure

Supercell, the company behind the super-popular mobile game Clash Royale, suffered a breach in September that might have exposed its users. A community manager announced on the firm’s forums that hackers managed to breach the website with a vulnerability last …

The post Clash Royale Forums Hacked but Game Accounts Still Secure appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Iowa tests secure school-based Wi-Fi service for officers – Education Week

View full post on Education Week: Bullying







#pso #htcs #b4inc

Read More

The post Iowa tests secure school-based Wi-Fi service for officers – Education Week appeared first on Parent Security Online.

View full post on Parent Security Online

Cornell Researchers Find, Shortened URLs Make File Sharing Less Secure

290x195hacker2

Attackers can search easily through shortened URL services that use only 5 to 7 characters, producing a small search space, making them vulnerable to brute-force hacking, Cornell researchers discovered.

Shortened URLs are convenient for sharing long Web addresses in email messages and through social media, but at the same time, pose a privacy hazard as the URLs produced by popular services are so short they are vulnerable to brute-force searching, a Cornell Tech research effort found.
In a paper published in April, two researchers revealed that the 5- and 6-character URLs produced by popular shortening services could be easily searched to discover sensitive documents inadvisedly shared by their owners. Attackers could scan shortened URLs at a sustained rate of 2.6 lookups every second, and would only have to pay $36,700 to rent the cloud computing time necessary to do so, co-authors Martin Georgiev and Vitaly Shmatikov stated in the report.
The lesson for users is that the obfuscation of a shortened link does not add security, Shmatikov, a professor of computer science at Cornell Tech, told eWEEK via email.
“When you share a short link, you should assume that you are sharing with everybody … whether it’s [a] OneDrive document or driving directions from your home address,” he said. “When cloud services offer users to generate a short link—like OneDrive did until recently—they should warn the users that by generating the link they are making the content public.”
The researchers found more than 70 million URL mappings on Bit.ly and almost 24 million URL mappings on Google Maps through their technique. To study the privacy implications, the researchers focused on Microsoft’s OneDrive cloud storage offering. They found that nearly 20,000 URLs linked to a file or folder on Microsoft’s OneDrive or SkyDrive service. The accounts could be traversed by anyone with the shortened URL who uses a brute-force search, to discover other files on the sharer’s cloud space.
Many of the accounts allowed anyone with the shortened URL to write to the folder, change a file and save it, raising concerns that attackers could embed malware into the files.
The shortening services need to make the URLs at least eight characters to make the space of all possible URLs computationally difficult to search, Shmatikov said.
“Given computing and scanning capabilities available today, eight characters or longer should be reasonably safe for now,” he said.
After Georgiev and Shmatikov notified Google of the security risk, the company increased the number of characters used by the shortened URLs produced by Google Maps to at least 11. eWEEK confirmed that Google Maps currently assigns shortened URLs of 12 characters.
Microsoft, on the other hand, did not acknowledge the weaknesses, but made two changes: It removed the “shorten link” option from OneDrive and blocked the systematic enumeration of files and folders by users with a shortened link, the researchers said.
“The only change in this respect is that having discovered one shared document; it is no longer trivial to discover all other shared documents in the same account since the account traversal methodology described in the paper no longer seems to work,” Shmatikov said.
Cornell Tech is a New York City-based graduate and research institution founded by Cornell University.
Source:http://www.eweek.com/security/shortened-urls-make-file-sharing-less-secure-cornell-researchers-find.html

Related Post

The post Cornell Researchers Find, Shortened URLs Make File Sharing Less Secure appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com