now browsing by tag


#parent | #kids | I’m a New Dad Scared About Pandemic-Era Day Care Safety. There’s Only One Expert I Wanted to Call. – Mother Jones | #parenting | #parenting | #kids

Rob Dobi The coronavirus is a rapidly developing news story, so some of the content in this article might be out of date. Check out our most recent coverage of […] View full post on National Cyber Security

#cybersecurity | #hackerspace | Cyber Minds: Expert Insights on Blockchain and Much More

Source: National Cyber Security – Produced By Gregory Evans

Shira Rubinoff is the President and Co-Founder of Prime Tech Partners, which is a unique incubator in NYC.  She is also the President of SecureMySocial, which warns people of social media problems in real time. 

In Shira’s new book “Cyber Minds,” we see a unique mix of cutting-edge perspectives on blockchain and where it is going, insights on several hot technologies like AI and the Internet of Things (IoT) as well as solid cybersecurity advice for technology and business leaders.   

Cutting right to the core, this book offers the best practical content l I have seen regarding blockchain’s potential, future and cybersecurity opportunities and drawbacks. The materials on blockchain, which includes interviews with thought-leaders in the area, are simply ground-breaking.

Here’s an excerpt from page 52 regarding blockchain:

“If you look into the financial services space, we’ve blueprinted the financial architecture and sort of overlaid it with the crypto industry. When you look at that, you realize that within five year, something amazing has been built. We’ve got exchanges, wallets, mining, interfaces, and so on. It’s all moving towards institutional grade infrastructure.

Logistics is another example. In the past few weeks, we’ve heard the news of the biggest competitors in logistics coming together. I believe it was DHL, UPS, and FedEx coming together to think about how they can use blockchain to reduce and merge the burden of governance in the system. We’ll get more efficient Internet safety from that.

Blockchain is being used by farmers for cattle feeding and in Switzerland, it’s starting to be used in the watch industry and the butter industry among others. …”

Here’s one other excerpt that I like from page 60 (quoting Sally Eaves) on the leading blockchain sectors:

“Yes, I would say two sectors (are leading) – financial (Read more…)

Source link

The post #cybersecurity | #hackerspace |<p> Cyber Minds: Expert Insights on Blockchain and Much More <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#school | #ransomware | Cyber security expert breaks down ransomware attacks

Source: National Cyber Security – Produced By Gregory Evans MONROE, La. (KNOE) – Gov. John Bel Edwards declared a state of emergency following a cyber-attack on Nov. 18. An apparent “ransomware” virus infected 1,500 of the state’s 30,000 computers last week. Source: (MGN) An apparent “ransomware” virus infected 1,500 of the state’s 30,000 computers. This […] View full post on


Like most of government and private sectors and industries around the world, organisations in Oman also face the same cyberthreats, including ransomware, malware attacks as well as data privacy and protection challenges.

The primary cybersecurity threat to Oman is email-borne malware. Ransomware and phishing attacks are also on the rise, says an expert.

Speaking exclusively to Muscat Daily, Raj Sabhlok, president of ManageEngine, the brand known for making efficient and thoughtful IT management software and a division of the popular Zoho Corporation said, “Going forward, one of the key challenges Oman will face is risk that Internet of Things (IoT) and Artificial Intelligence (AI) pose to enterprise data and IT security. In the IT departments, those external threats compound the internal threat of poor IT management practices. The internal threats range from lax endpoint management such as failure to containerise enterprise data on employee-owned devices to inconsistent application patching, weak password management, and more. Healthcare and financial services are top targets of cyberattacks.”

Speaking on the integration to the role of IT management and cybersecurity in addressing the latest technology developments in global cloud, networking, and security management, he added, “Recent security breaches have made it clear that just about any IT element can become an attack vector, and improper IT management just paves the way for cybercriminals. With latest technology developments in cloud and elsewhere, organisations need to be proactive in IT management, so that the opportunities and benefits do not come at the cost of breaches, data theft, and other cyberattacks.

“Of course, the IT management tools must support that proactive posture, both as individual products as well as an integrated suite.”

On the safety of cloud, Sabhlok said, “Over the years, cloud companies have invested heavily in the security of their cloud infrastructure and applications. The investments include the resources needed to create redundant copies of data, encrypt data, authenticate users, and more. Amazon Web Services (AWS) has more than 1,800 security controls for its services, the BBC reports. And the exponential adoption of cloud technologies in the recent past is a testament to the overall security of the cloud.

“Meanwhile, cloud vendors continue to enhance the security of their offerings so that they comply with the growing array of data protection and data privacy laws such as EU’s General Data Protection Regulation, and South Africa’s Protection of Personal Information Act. Going forward, cloud vendors will have to scale their IT to accommodate relentless growth: Gartner predicts worldwide public cloud services revenue will reach US$411.4bn in 2020 compared to the 2017 revenue of US$260.2bn. Mobility will be another challenge for cloud vendors as well as keeping operating and capital expenses in check as demand for their services grow.”


The post PRIMARY #CYBERSECURITY #THREAT TO #OMAN IS #EMAIL-BORNE #MALWARE, SAYS #EXPERT appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Cybersecurity #Expert on #Tech #Giants Collecting Our #Data: ‘It’s Not #Surprising’

Software developer Dylan McKay discovered that Facebook has been collecting caller history and SMS data from outside the app. According to McKay, he became interested in what Facebook had collected on him after political consultancy Cambridge Analytica was accused of improperly harvesting the information of nearly 50 million Facebook users.

According to reports, Facebook became aware of Cambridge Analytica’s access to personal data back in 2015, after which it demanded that the acquired information be deleted.

While the firm assured the tech giant that its requirements have been fulfilled, Facebook recently learned that the data has not been completely destroyed.

Radio Sputnik discussed this with Kenneth Shak, senior cybersecurity consultant at LGMS, a professional information security service firm from South Asia.

Kenneth Shak: It’s not surprising that these tech giants are actually collecting our data. For example, from my own experience, I have come across when discussing some sort of information with my colleagues or my friends, for example, and, all of a sudden, in my Facebook or in my Google I can see ads targeted to what I was actually discussing. So there’s actually no fine line on how much these tech giants are actually collecting data from, so it’s quite scary, to be honest. All in all, it all boils down to the permissions given to the applications. It is not only the main Facebook application.

You have the Messenger application; you have the Messenger Lite application. I’m not sure that you realized upon installing and using these applications the first time on your phone you are actually asked a few questions. In the first, installing and using this application they will actually ask if you would like to link and upload your phone’s contacts to Facebook because you will make things easier for users to find or add friends on Facebook with all this contact data.

This step, though, is optional but not only on the Facebook application. Messenger will actually ask users for permission to access the SMS and call data on your phones for a similar purpose. But for Messenger, in particular, not the plain Facebook app, you’ll also be able to access your SMS messages and also your call log logs directly from your Messenger application. Think of it as an all-in-one messenger. When you have given all these permissions to Facebook to access all this data that was actually how they have managed to update all this data they have stored. Outside of the application and not just inside what you have given to Facebook and all these things are actually stored on your phone.

Sputnik: Do you think that in the future we can expect that there will be some kind of way to opt out of certain permissions?

Kenneth Shak: They should give a bit more convenience to the users to choose what they want to share. Actually, on your phones you can explicitly disable what you can share, for example the phone, the contacts, the storage, the camera. You can actually disable all those but they need all these permissions in order to work properly.

I’m not sure if you know, back February this year, Germany actually came to a ruling that how Facebook actually collects and uses the personal data of these users to be illegal. The reason is because there is insufficient information provided by Facebook to the users in order for the users to run their meaningful consent. So the users actually don’t know what exactly they are giving consent to. Facebook actually asked the users to agree to give access to camera, to the contacts, to the SMSs, to the address books but they do not tell the users to what extent they are giving or how much data they’re actually giving. This is actually a very-very vague consent given to Facebook.

Sputnik: So, now after that ruling, were there any changes made or was Facebook subjected any fines? What happened with Facebook in that situation?
Kenneth Shak: It depends very much from country to country. Since Facebook actually asked the users for their consents, no matter how vague they are, to gather and store this data during the installation, it may actually be legal for Facebook to do so. It’s a very-very fine line. It also boils down to the regulations imposed by different countries or their governments and where the Facebook actually operates. Germany can’t do much.

They can just rule that, this information, how they gather it, is very illegal. But since Facebook operates in Ireland and the US, users outside of these countries mainly are not able to do anything except filing a lawsuit from where Facebook is operating from, for example US or Ireland. For example, from our side, users from Malaysia definitely wouldn’t be able to do anything in regards to this issue because Facebook is not sanctioned under our Malaysian laws.

Sputnik: Do you think that we could see some serious legal action that’s going to have some really huge impact, not only on Facebook but on other tech companies as well?

Kenneth Shak: Definitely this is just the tip of the iceberg, but again as you know this is not the first kind of problem relating to personal data that actually surfaced. So for Facebook we actually see quite a number of lawsuits coming in and several governments are actually inquiring into this particular issue. Of course, all this amounts to Facebook losing nearly $50 billion off their share price. There is a long road ahead for Facebook trying to recover from all this. In light of all these issues Facebook, and not just Facebook, in particular and social media platforms like Instagram may be imposed with further regulations as well. This problem brings to light many other enhancements and additions of the regulations for other companies or tech giants as well in the future, not just for Facebook. The world will actually start to learn from this particular big issue and we will see further developments to this question as investigations on this issue are still on going.


The post Cybersecurity #Expert on #Tech #Giants Collecting Our #Data: ‘It’s Not #Surprising’ appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

State #institutions in #Denmark #vulnerable to #hacking, expert #reveals

Source: National Cyber Security News

Last summer one of Denmark’s biggest companies, Maersk, was hit by a hacking attack that paralysed its computer systems and ended up costing the firm an estimated 1.9 billion kroner.

And the shipper is not the only one. Twice in 2017, the Southern Denmark region experienced ransomware attacks that locked users out of their accounts and databases.

A survey of state institutions undertaken by the national auditor, Rigsrevisionen, has shown that the Foreign Ministry, health service databank Sundhedsdatastyrelsen, state railway track owner Banedanmark and the emergency response service Beredskabsstyrelsen are all potentially vulnerable to similar attacks, reports DR Nyheder.

Update your security systems!
The auditors noted that security to prevent ransomware attacks was not sufficient and that none of the institutions have fully ensured that their programs all have the latest security updates.

IT security expert Christian Dinesen from the consultancy firm NNIT feels that these institutions are making it much too easy for cyber criminals.

“It is critical, because all these institutions perform vital functions in our society,” said Dinesen.

“What the report shows unfortunately is an immaturity that is also found in other places. Things like local administrators’ rights and security programs not being updated have been in the spotlight for the last 15 years.

Read More….


View full post on National Cyber Security Ventures

‘Cyber is the New #Black’: #Cyber Expert Points to #Diplomacy to #Solve Global #Cybersecurity Issues

Source: National Cyber Security – Produced By Gregory Evans

With growing threats not only in the physical world but also in today’s nebular cyber world, Christopher Painter ’80 argued that “cyber is the new black,” meaning that “everyone cares about cyber” now.

Painter, who has been at the forefront of cyber issues for the last 25 years, addressed growing security concerns and the role of modern cyber-diplomacy at the 2017 Bartels World Affairs Fellowship Lecture this Wednesday.

Painter, the “weary warrior” of cyber warfare for his entire career, started his career as a prosecutor dealing with cyber cases and served as the U.S. State Department’s first coordinator for cyber issues from 2011 until July this year.

While studying at Cornell in 1979, Painter used punched cards for computer programming and played hundreds of sessions of BakéGyamon, an anime computer game, for his work study. Back then, Painter reflected, “the internet … existed in very basic form. The world wide web certainly didn’t exist.”

But technology has come far since; today, “we are all dependant [on the internet] for financial transactions, social transactions and to communicate really for everything,” Painter said.

However, though this rapid technological innovation has largely “been a tremendous force for good,” it does not come without its dangers.

“[The internet] has been the target of criminals, malicious state actors, terrorists and others,” Painter said.

Therefore, it is essential to find the balance, so that we are “not trading security for openness … but having all these things together,” Painter said.

“Back then, people looked at computer hackers as Robin Hood’s,” Painter said, because the common citizen’s information was not stolen, nor were they personally threatened.

This is no longer the case for the common citizen today.

In 2000, Painter was involved in a case that seemed to be a sophisticated, dangerous attack because it was on a global scale, but in reality, it was a fourteen-year-old Canadian boy, called the “MafiaBoy,” hacking computers.

His acts, Painter said, “had really a disproportionate effect and demonstrates the asymmetric nature of the technical threat.”

On a more serious note, Painter discussed the time North Korea hacked into Sony to pull back the distribution of an image, in which the country was “not only hacking into a system but was meant to curtail freedom of expression rights,” he said.

Taking this a step further, Painter highlighted a major concern regarding cybersecurity: “the fear of a debilitating attack against our infrastructure,” he said, pointing to possible examples of taking down the water system and the power system.

Painter said plainly, “It would have long-term, terrible consequences” as “not just a cyber but as a physical event.”

Therefore, “we have to be cognisant of these threats going forward,” he said.

These threats transcend individual hackers to entire nations, with different states having different visions for the future of technology.

Whereas much of the Western world is open about sharing information, Russia and China are among the countries that “want absolute sovereignty in cyberspace,” Painter said.

“The internet is not run by states — not run by government,” Painter said.

Although governments have influence over the internet to some extent, the private sector is involved, too, as Painter explained, so it is an international issue that different groups of people have to confront together.

Painter believes international law should apply to cyberspace as it does to the physical world. There are a set of norms many countries agree to, such as the idea that a nation should not attack infrastructures meant for the public good.

“You have to get countries around the world to embrace this to really make these norms stick,” he said.

So, how do we deal with the issue of cybersecurity?

Painter said, “It all comes down to the role of diplomacy — in all of this, the role of building alliances and shaping the environment and showing international cooperation is really paramount.”

The post ‘Cyber is the New #Black’: #Cyber Expert Points to #Diplomacy to #Solve Global #Cybersecurity Issues appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Cyber security #expert warns about the #dangers of sending #explicit images #online

Source: National Cyber Security – Produced By Gregory Evans

Cyber security #expert warns about the #dangers of sending #explicit images #online

A cyber security expert is warning about the dangers of sending sexually explicit images to strangers online.

Many Irish companies increased their IT security in the wake of the ‘Wanna Cry’ randsomware incident earlier this year, which affected systems in hundreds of countries around the world.

‘Sextortion’ is a much less complicated scheme which targets individuals on various social networking sites.

The CEO of Cyber Risk International, Paul Dwyer, who will be speaking at todays Cyber Threat Summit in Dublin, says people need to be aware of the scam.

He said: “People hear time and time again about the fact that there are fake profiles that reach out to people.

“They start a relationship with them and then they will ask them to do an embarassing act on camera, then hold them to ransom.

“That is happenning all the time, we are getting regular calls, and not just us but other security providers too.”


The post Cyber security #expert warns about the #dangers of sending #explicit images #online appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Will the iPhone X’s Face ID be hackable? Security expert weighs in

Will the iPhone X’s Face ID be hackable? Security expert weighs inSource: National Cyber Security – Produced By Gregory Evans The iPhone X’s facial recognition technologies have been called into question by a security consultant at global tech firm Synopsys, who claims that no facial recognition technology is ever unbeatable. Nikola Cucakovic posted a blog titled ‘How secure is iPhone X Face ID facial recognition’, which […] View full post on | Can You Be Hacked?

More people meeting online regardless of age, says expert

To Purchase This Product/Services, Go To The Store Link Above Or Go To The latest census says there are approximately 14.3 million singles in Canada, and according to sociologist Sarah Knudson, more and more are dating online — regardless of age. “The biggest story in the past 15 years…

The post More people meeting online regardless of age, says expert appeared first on

View full post on