HTCS Blogs

now browsing by category

 

Bitcoin users are opening their wallets to hackers through mobile networks

Source: National Cyber Security – Produced By Gregory Evans

Cryptocurrencies like Bitcoin make a big deal of their security; theoretically, they are almost impossible to hack. Every transaction is stored in a ‘digital ledger’, shared across multiple machines; an attacker would need to compromise every computer in the chain to successfully hack the system. However, the digital wallets that…

The post Bitcoin users are opening their wallets to hackers through mobile networks appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

A Better Way to Teach Cybersecurity to Workers

Source: National Cyber Security – Produced By Gregory Evans

Companies are starting to take a new approach to getting employees to be more vigilant about cybersecurity. Instead of punishing employees when they make mistakes, they’re rewarding them when they do something good. The problem, security experts say, is that the usual security training is a big turnoff for employees….

The post A Better Way to Teach Cybersecurity to Workers appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Safeguarding SMB Customer against Sophisticated Cyberattacks

Source: National Cyber Security – Produced By Gregory Evans

Cybercrime or cyberattacks has become a major concern for the economies across borders, ranging from states, corporates giants, small and medium industries, and even individuals at home. The driving force behind frequent and sophisticated cyberattacks at all levels of organizations, pertains to the idea–what cyber criminals gain? The primary focus…

The post Safeguarding SMB Customer against Sophisticated Cyberattacks appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Vetting of social media, phones possible as part of travel ban review

Source: National Cyber Security – Produced By Gregory Evans

The Trump administration is developing new ways to vet people coming into the United States as a deadline in the President’s controversial travel ban nears, officials said Tuesday. “Each of the opportunities that the US government has to interview and/or vet potential inbound travelers is being reviewed,” acting Customs and…

The post Vetting of social media, phones possible as part of travel ban review appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

All That’s Needed To Hack Gmail And Rob Bitcoin: A Name And A Phone Number

All That’s Needed To Hack Gmail And Rob Bitcoin: A Name And A Phone NumberSource: National Cyber Security – Produced By Gregory Evans Hackers have proven just how urgently a gaping flaw in the global telecoms network, affecting what’s known as Signalling System No. 7 (SS7), needs to be fixed. In a video demonstration, shown to Forbes ahead of publication today, benevolent hackers from Positive Technologies were able to […] View full post on AmIHackerProof.com | Can You Be Hacked?

20-year prison term proposed for hackers of State secrets

Source: National Cyber Security – Produced By Gregory Evans

Cyber criminals, convicted of hacking into government databases to mine State secrets for sale to foreign countries, will serve 20 years in jail if Parliament passes a Bill seeking to tame the growing white-collar crime. The Computer and Cybercrimes Bill 2017, a revised version of a 2016 law, also proposes…

The post 20-year prison term proposed for hackers of State secrets appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Cyberattack performed by Anonymous hackers on Israeli government ministry’s website

Source: National Cyber Security – Produced By Gregory Evans

Members of Anonymous hacked into the website of the Israeli Periphery Development Ministry’s Galilee Development Authority leaving a message with the organization’s symbol: “Israel is helping human terrorist groups,” they wrote. The website of the Israeli Periphery Development Ministry’s Galilee Development Authority was broken into by hackers from Anonymous, most…

The post Cyberattack performed by Anonymous hackers on Israeli government ministry’s website appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Juncker announces massive cyber security overhaul

Source: National Cyber Security – Produced By Gregory Evans

The European Commission will add funds and new powers for the EU cyber security agency and introduce a range of measures to limit threats from hackers, Commission President Jean-Claude Juncker announced in his annual state of the union speech on Wednesday (13 September). Cyber security attacks can be “more dangerous…

The post Juncker announces massive cyber security overhaul appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

McAfee boosts cyber security software suite with a beefed-up anti-malware engine to tackle hack attacks

Source: National Cyber Security – Produced By Gregory Evans

Cyber security firm McAfee has given its core suite of anti-virus and security software an overhaul to bolster the protection it can provide against currnet and future hack attacks. McAfee AntiVirus Plus, McAfee Internet Security, McAfee Total Protection and McAfee LiveSafe have all had an upgrade, giving them access to…

The post McAfee boosts cyber security software suite with a beefed-up anti-malware engine to tackle hack attacks appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Cyber Security Analyst I Job

Source: National Cyber Security – Produced By Gregory Evans

Job Description: The successful candidate must possess the ability to perform information security risk assessments and information compliance activities in accordance with the NIST Risk Management Framework and NIST 800-53 Rev 5 for new projects and legacy infrastructure, databases and applications. The candidate must have the ability to assess the…

The post Cyber Security Analyst I Job appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures