Attackers

now browsing by tag

 
 

Businesses overconfident about keeping attackers at bay

Source: National Cyber Security – Produced By Gregory Evans

Despite the increasing number of data breaches and nearly 1.4 billion data records being lost or stolen in 2016, the vast majority of IT professionals still believe perimeter security is effective at keeping unauthorized users out of their networks. However, companies are under investing in technology that adequately protects their…

The post Businesses overconfident about keeping attackers at bay appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

This Bill Would Allow Hacking Victims to Hack Their Attackers

Source: National Cyber Security – Produced By Gregory Evans

This Bill Would Allow Hacking Victims to Hack Their Attackers

Call it a Stand Your Ground law for cyberspace. A Republican congressman is floating a bill that would make it legal for victims of hacker intrusions to hack back against the attacker, the first move to legalize any form of computer intrusion since the federal Computer Fraud and Abuse Act…

The post This Bill Would Allow Hacking Victims to Hack Their Attackers appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

New Android lockscreen hack gives attackers full access to locked devices

Source: National Cyber Security – Produced By Gregory Evans

Software bugs that allow attackers to bypass smartphone lockscreens are common enough for both Android and iOS devices, but like…

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post New Android lockscreen hack gives attackers full access to locked devices appeared first on National Cyber Security.

View full post on National Cyber Security

Send attackers on a wild goose chase with deception technologies

Source: National Cyber Security – Produced By Gregory Evans

Midsized companies with revenues from $100 million to $1 billion spent an average of $3 million on information security as of 2014 per “The Global State of Information Security Survey 2015” from PwC. “I promise you, bad guys are not spending $3 million to break into your organization,” says Allen Harper, chief hacker, Tangible Security. Still information burglars are getting through. And since 92 percent of IT and security professionals surveyed globally use signature-based antivirus software on their servers, despite AV’s inability to stop advanced threats and targeted attacks, according to Bit9’s 2013 Server Security Survey, exploits such as zero-days, which have no signatures give attackers the upper hand. To turn the tide, security experts are pressing enterprises to turn to behavior-based approaches where an illicit behavior can identify a probable exploit, whether security software has an example of its ‘fingerprint” or not. Security researchers are updating a behavior-based approach that has been around for decades. That approach is Deception. Deception identifies an attacker when they exhibit the behavior of simply falling for the Deception, such as by trying to interact with a fake web server that no one with a legitimate business purpose is using. CSO explores the purposes […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Send attackers on a wild goose chase with deception technologies appeared first on National Cyber Security.

View full post on National Cyber Security

UCLA Health system targeted by cyber attackers

Source: National Cyber Security – Produced By Gregory Evans

As many as 4.5 million patient files may have been breached by a cyber attack on the UCLA Health system, but there is no evidence yet that any personal or medical information has been accessed, officials said Friday. The attack may have occurred as early as last September. In October, UCLA Health administrators said they detected some suspicious activity and began an investigation with the FBI. Though at the time it didn’t appear that attackers had infiltrated the system, an investigation continued, and by May administrators found that the UCLA Health network, which includes the Ronald Reagan Medical Health Center, contains names, addresses, dates of birth, Social Security numbers, medical record numbers, Medicare or health plan ID numbers and some medical information that could have been accessed in the cyber attack. “We take this attack on our systems extremely seriously,” said Dr. James Atkinson, the interim associate vice chancellor and president of the UCLA Hospital System. “Our patients come first at UCLA Health, and confidentiality is a critical part of our commitment to care. We sincerely regret any impact this incident may have on those we serve. We have taken significant steps to further protect data and strengthen our network […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post UCLA Health system targeted by cyber attackers appeared first on National Cyber Security.

View full post on National Cyber Security

Cyber Attackers Stole More Than 61M Customer Records in 2014

Cyber Attackers Stole More Than 61M Customer Records in 2014

New data from IBM (IBM) showed that despite a decline in cyber attack incidents against U.S. retailers, the number of customer records stolen during cyber attacks remained near record highs in 2014. IBM reported that cyber attackers secured more than […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security