now browsing by tag


We now know what Meghan Markle wore on her first date with Prince Harry | #tinder | #pof | romancescams | #scams

_________________________ What does one wear to meet a prince? It’s hard enough to figure out what you’ll wear on a Tinder date over Zoom so we don’t envy the dilemma […] View full post on National Cyber Security

#cybersecurity | #hackerspace | Zero Networks Launches Industry’s First Autonomous Network Access Orchestrator, Announces $4.65 Million in Funding

Source: National Cyber Security – Produced By Gregory Evans

Debuting at the RSA® Conference’s Launch Pad, the platform delivers adaptive user and machine-level policy enforcement to make a zero trust network model at scale a reality  

NEW YORK and TEL AVIV – February 20, 2020 – Zero Networks (, the pioneer in zero trust network access, today unveiled the Zero Networks Access Orchestrator, the first network security platform that automatically defines, enforces and adapts user- and machine-level network access policies to create a continuous airtight zero trust network model, at scale. The company was named one of three finalists for the prestigious RSAC Launch Pad, where it will debut the platform, on February 26th, during the RSA Conference, the world’s leading information security conference.

Zero Networks also announced it has raised $4.65 million in seed funding, led by F2 Capital and Pico Venture Partners. This funding will be used to accelerate product development and hire key positions in engineering, marketing, sales and business development.

Assuming users and machines inside the network can be completely trusted leaves the door open for malicious insiders and hackers to do almost anything they want. Zero Networks minimizes these risks, with the click of a button, constraining access in the network to only what users and machines should be doing. The Zero Networks Access Orchestrator is the first of its kind to deliver:

  • Autonomous policy enforcement – observes how users and machines normally communicate to automatically enforce a zero trust networking stance throughout your environment, with a two-factor authentication (2FA) mechanism to allow new or rare access, so users can always get what they need, when they need it.
  • Airtight security – establishes least privilege access for each and every user and machine, so they can only access only what they need, and nothing more. This provides a scalable and cost-efficient way for enterprises to establish user and machine-level perimeters that put an end to excessive allowances within the network. It also eliminates many internal attack vectors, such as network discovery, lateral movement, remote code execution and the introduction of commodity malware.
  • Access control at scale – provides a single source for all network access policies, so the entire environment is protected from managed and unmanaged devices, at scale, with the click of a button. There are no agents to deploy and no policies for IT to configure or manage.

“Zero Networks is making a zero trust security model at scale a reality,” said Jonathan Saacks, managing partner from F2 Capital. “Their approach is a radical change for the market, but not a radical change for enterprises, which is why it is so effective,” added Tal Yatsiv, operating partner at PICO Venture Partners. “Enterprises can go about their business and lock down the access of each of their users and machines to only what they need, without agents, without intervention, and without disruptions.”

Zero Networks founders Benny Lakunishok and Jossef Harush came up with the Zero Networks Access Orchestrator when they saw the burden that IT and security teams face in trying to maintain real-time access requirements for all users and machines across their environment. With deep experience in cybersecurity, they knew there had to be better, more scalable solution.

Mr. Lakunishok has been in cybersecurity for the past decade and was part of the leadership team of Aorato, which was acquired by Microsoft. Mr. Harush previously led the architecture and engineering team at CyberX. Together, they established Zero Networks to make it easy for enterprises to adapt and scale airtight, internal network access policies that keep attackers out and the business going.

The Zero Networks Access Orchestrator is currently being used by beta customers in the manufacturing, energy, retail and public sectors to defend their internal networks and will be commercially available at the end of Q1 2020.

About Zero Networks

Zero Networks automates the creation, enforcement and maintenance of zero trust network access policies for each user and machine to make zero trust security model at scale a reality. The Zero Networks Access Orchestrator enables organizations to keep up with the changes in their dynamic environment and prevent breaches from impacting operations, so they can be confident their users and machines are able to go about their business and nothing more. With Zero Networks, there are zero hassles, disruptions or worries - there’s just trust. For more information, please visit or follow Zero Networks on LinkedIn at or Twitter at


Source link

The post #cybersecurity | #hackerspace |<p> Zero Networks Launches Industry’s First Autonomous Network Access Orchestrator, Announces $4.65 Million in Funding <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#deepweb | Indian authorities arrest their first crypto dark web drug dealer

Source: National Cyber Security – Produced By Gregory Evans

  • The suspect, Dipu Singh, is accused of selling psychotropic and prescription pills on the dark web.
  • He was taken into custody by the central anti-narcotics agency under the Narcotic Drugs and Psychotropic Substances (NDPS) Act.

In an investigation done by the Narcotics Control Bureau (NCB), India has caught its first darknet crypto drug dealer. The authorities have seized 55,000 tablets in the arrest. The NCB participated in “Operation Trance” – a multinational crackdown on illicit dark web drug sales using couriers, international postal services, and private parcel deliveries.

Global post offices and international courier services were used as logistics for illicit trade. The payments gateways of cryptocurrency were used by the operators to conceal the transactions from law enforcement agencies.

The accused, Dipu Singh, is a 21-year old whose father is a retired army officer. Singh is accused of selling many psychotropic and prescription pills on the dark web and shipping them to the US, Romania, Spain, and other countries.

He started out by selling health supplements and erectile dysfunction medication on major dark web markets. Later, he began selling tramadol, zolpidem, alprazolam and other psychotropic prescription medications. The suspect was taken into custody by the central anti-narcotics agency under the Narcotic Drugs and Psychotropic Substances (NDPS) Act. 


Source link

The post #deepweb | <p> Indian authorities arrest their first crypto dark web drug dealer <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#deepweb | The Clone Wars Final Season Poster Arrives with First 2 Episode Titles and Synopses

Source: National Cyber Security – Produced By Gregory Evans Lucasfilm and Disney have released the synopses for the first two episodes of The Clone Wars season 7. It was recently announced that the long-awaited season will premiere February 21st on Disney+. The Clone Wars and Rebels are often regarded by hardcore Star Wars fans as […] View full post on

#cyberfraud | #cybercriminals | The first thing to do after you’re involved in a hack

Source: National Cyber Security – Produced By Gregory Evans There were a bunch of big data hacks in 2019, and 2020 will likely be just as bad as the number of cyberattacks increase. (The average number of security breaches in the last year grew by 11% from 130 in 2017 to 145 in 2018, according to Accenture research.) Companies […] View full post on

#cybersecurity | #hackerspace | First Amendment Fight: Twitter Threat Ends in Conviction

Source: National Cyber Security – Produced By Gregory Evans First amendment rights in the United States only go so far. Shout “fire” in a crowded room for thrills or threaten to kill someone and you will find yourself on the wrong side of the First Amendment interpretation of what constitutes free speech. Joseph Cecil Vandevere […] View full post on

#cybersecurity | #hackerspace | Security First: The Double-Edged Sword of Remote Collaboration

Source: National Cyber Security – Produced By Gregory Evans

For the better part of the past decade, online tech support scams have been on the rise as hackers find new ways to trick consumers into providing remote access to their computers in order to steal information. This tried-and-true phishing scam today relies on sophisticated social engineering fueled with detailed information on the user that can trick even the most savvy or skeptical user into keeping the scam going.

In fact, in 2017 alone, 2.7 million Americans reported some form of fraud to the Federal Trade Commission. And there were almost certainly many more who were either too embarrassed or too jaded to report what they experienced.

What essentially all online and email scams share is that they attempt to impersonate someone or some institution that seems credible. They attempt to capitalize on the recipient’s cultural norms of trust, courtesy, and professionalism to hear out their pitch. They usually attempt to play into the listener’s sense of fear over losing something, like a valuable service or, alternatively, appeal to the listener’s opportunism for getting something valuable for nothing.

Phishing scams today often involve someone pretending to be from a company you already do business with such as Apple, Microsoft, or Amazon, sending out a text or email that says you have a problem with your account, or perhaps a delivery issue, a refund, or some other plausible-sounding matter. You are then directed to a link and told that unless you provide confirmation of your account information, that account will be suspended, and legal action will follow.

The phisher almost certainly doesn’t have either your username or password. If they did, they wouldn’t have to bother using an elaborate ruse to gain access your computer network. Instead, claiming that it’s a matter of great urgency, they use deceit to trick you into providing access to data, images, text files, or money.

One particularly damaging form of trickery may not involve email at all. It could start with a phone call from someone pretending to be your helpdesk or IT service organization needing to remotely access your computer to update or fix something. “All you need to do is download this maintenance patch I’ll send you and let me do the rest,” the user is told. Of course, it’s a scam for someone to access the network. Here are some common tips.

Security Tips: Cutting Back on Phish

With so much toxic angling, a low-phish diet will be good for you and your business. Sooner or later, everyone is likely to receive a deceptive phone call or email. But like any diet, this one requires awareness, education, and discipline. Essentially, all phishing scams require the recipient to open or click on something that’s malicious. Educating yourself and your employees about how to recognize, avoid, and report phishing attempts is essential to the effort. Vigilance and skepticism online are the mantras of digital living.

  • Many phishing messages share certain elements in common. One of the most frequent is a sense of urgency saying that the recipient needs to do something immediately – either to send money to verify certain information, or to update their credit card on file. That’s a red flag. Banks, government agencies, and most business organizations still use snail mail to collect funds and personal data.
  • When you do receive an email from your bank that requires action, log on to its website by keying in the bank’s URL yourself. Don’t use the link in the message to visit the bank’s website; it could actually be a malware attack on your computer. By hovering over a link in the message without clicking on it, a balloon will appear with the sender’s real address. If it looks phishy and doesn’t contain the official domain of your bank, pick up the phone and call your bank.
  • Many scams originate overseas from countries where English is not the native language. As a result, there might be awkward phrasing, archaic terms, or misspelled words that a professionally written email or website from an authentic U.S. organization would never use. That’s another red flag.

To help train employees, IT personnel can periodically send fake “phishing” emails, which helps identify vulnerable staff members who could benefit from more guidance. They can teach users to recognize malicious messages.

But scams continue to evolve. Ongoing education and awareness efforts, together with prompt reporting of suspicious emails, are essential to maintaining the first line of defense against phishing scams–alert company employees and wary business executives. Remote collaboration may be a double-edged sword but, using the right defense, the user can properly yield its power.

Source link

The post #cybersecurity | #hackerspace |<p> Security First: The Double-Edged Sword of Remote Collaboration <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#hacking | Scott Morrison says drought the Coalition’s ‘first call’ – but makes no mention of climate | Australia news

Source: National Cyber Security – Produced By Gregory Evans

Scott Morrison has indicated the federal government might be prepared to commit extra relief funding to drought-stricken communities, reaffirming the drought is the government’s top priority.

In a triumphal speech to the Liberal party’s federal council in Canberra on Saturday, Morrison again said the drought was “the most pressing and biggest call on our budget”.

“It is the first cab off the rank, the first thing we sit together and say, ‘Once we have done everything we can in this area, then we can consider other priorities’.

“It is the biggest call on the budget because it is the most pressing, the rock I’m going to put in the jar first. It is the first call because that is what is needed in our rural and regional communities. They know we cannot make it rain and they know we cannot make it like it was before the drought.”

The prime minister did not mention the climate crisis while detailing the government’s three-phase drought response package thus far: the farm household allowance for eligible farming families; the drought communities program dedicating $100m to councils affected by the drought; and long-term drought resilience plans, including money for new dams and the drought future fund.

“That is what we are doing on drought and we will keep responding,” Morrison said. “We will keep going and delivering. That is why you need resilient and strong budget. That is why we will not walk away.”

But the budget is coming under significant pressure, with a sharp downturn in the economic outlook. The IMF this week forecast a global “synchronised slowdown” of world economies, and a “precarious outlook” for recovery. Australia is forecast to grow more slowly than Greece, with 1.7% growth in 2019, a full percentage point below 2018’s 2.7%.

But the treasurer, Josh Frydenberg – currently at the G20 – has said additional drought support would not sacrifice the surplus, saying natural disasters had been taken into account when the Coalition made its pre-election pledge to return the budget to balance and then surplus next year. The midyear economic and fiscal outlook (MYEFO) will come out before Christmas. Any additional drought spending is likely to be detailed there.

The government has been criticised by Labor for moving too slowly on the drought. Accusing the government of “six years of inaction”, Labor’s Joel Fitzgibbon has called for a bipartisan drought war cabinet to be established.

“What began as crisis for our farmers fast moved to a crisis for our rural townships, which are literally running out of water,” he said. “And I fear that we now are fast approaching a threat to our food security … We need to sit the major parties down together and to start making some pretty significant decisions.”

The drought response has also been questioned by some councils, including Moyne shire in south-west Victoria, which was given $100m despite not being in drought and whose mayor said he wanted to refuse it.

“Our council has never applied for funding under this drought package or any other similar program of drought-assistance funding,” Moyne shire council mayor Mick Wolfe said.

Morrison’s speech to the party faithful in Canberra was a triumphal affair, given the occasion of the 75th anniversary of the party’s founding by Robert Menzies, the Coalition’s unexpected election win in May and his own rise to unchallenged authority within the party.

He condemned the Labor party for what he described as its “panic in a crisis” and “politics of envy”, in particular highlighting the party’s current corruption issues in NSW.

The Liberal party federal council will also debate a series of motions from various branches of the party.

The Young Liberals called on the party to “reaffirm its strong support for freedom of speech and the rule of law around the world and supports the right of the people of Hong Kong to protests peacefully in defence of those freedoms”.

The Morrison government’s rhetoric towards China has become increasingly bellicose in recent weeks: the home affairs minister, Peter Dutton, accused the Chinese Communist Party of political repression, intellectual property theft and cyber hacking; the foreign affairs minister, Marise Payne, has been forthright in her demands over detained Australian writer Yang Hengjun; while Morrison has taken an uncompromising position on China’s “developing nation” status at the WTO.

However, it’s unclear whether an overtly political motion such as the Young Liberals’ support for Hong Kong will win broader party support.

The ACT branch of the Liberal party has called on the government to “prioritise a free trade agreement with the UK over the European Union” and also wants the government to reject European demands for “geographic indicators” on food products in Australia, such as on feta, gruyere and gorgonzola cheeses.

The ACT Liberals also want investigation of “innovative financing options” for a high-speed rail linking Australia’s east-coast capitals.

And the West Australian branch want legislation mandating that public funding for both “yes” and “no” campaigns be equal at all future constitutional referenda, a legacy of the marriage equality campaign.

Source link

The post #hacking | Scott Morrison says drought the Coalition’s ‘first call’ – but makes no mention of climate | Australia news appeared first on National Cyber Security.

View full post on National Cyber Security

#iossecurity | #applesecurity | How Tim Draper’s first job picking apples made him a capitalist

Source: National Cyber Security – Produced By Gregory Evans

Tim Draper — the billionaire venture capitalist who built his fortune by making early investments in Twitter, Skype, Tesla and SpaceX (to name a few) — says his first job as an apple picker drove him to capitalism.

“When I was about 8 years old, my first job was picking apples. We had a couple of apple trees in our backyard and it was harvest time, so I picked a bunch of them and I would take them down to the end of the driveway and sell them,” Draper, 61, founding partner at Draper Associates, tells CNBC Make It.

His asking price: 5 cents an apple, which in 1966 was the same price as a U.S. postage stamp.

“I [sold apples] every day for a couple of months, and every once in a while one of my friends would come by in the neighborhood and stay with me for a little bit while I sold them,” Draper remembers.

At the end of the season, he says, he was wrapping up selling his last batch, when his friend’s mother approached him and asked him how much he made.

Draper says he told her $8, which meant he sold 160 apples that season. He says he was ecstatic over the accomplishment.

But his friend’s mother wasn’t. Draper says she took the $8 away from him and asked him who else had been there to help him sell apples. She then divided up the money and gave each kid a dollar who stopped by to help, leaving Draper with a dollar himself.

“It was my first exposure to socialism, and I decided at that point that there had to be a better system for sharing the wealth,” Draper says.

The experience, he says, led him to become a capitalist — just like his dad and grandfather were.

Draper’s grandfather, William Draper Jr., founded the first venture capital firm in Silicon Valley in 1959 called Draper, Gaither & Anderson, while his father William Draper III, founded Draper & Johnson Investment Company in 1962. Draper started his own early-stage venture capital firm in 1985.

While Draper does believe change is desperately needed to combat income inequality not only in the U.S. but globally, he doesn’t believe socialism or free-cash handouts (the idea of giving out a “no strings attached” cash handout to every citizen regardless of employment status) are the solutions.

“It all depends on how it’s done. I think that it is an interesting idea and a good safety net for people,” Draper says, “but I’m always a believer that you have to teach people to fish rather than handing them all the fish. And I would rather see that money go into improving education instead.”

Draper says what the government really needs is a “Steve Jobs type candidate,” meaning someone capable of completely revolutionizing the way something works, to get elected and reshape our government systems like Jobs did with the iPhone.

“The government is still operating like a mainframe computer while the rest of us all have smartphones.”

Like this story? Like CNBC Make It on Facebook.

Don’t miss: This self-made millionaire says the key to his success is eating only fruit until noon

Forget self-help: Some business execs are paying up to $1,000 an hour for hypnosis

This wellness clinic charges execs $8,000 and up for brain-boosting programs (despite doctors’ warnings)

Source link

The post #iossecurity | #applesecurity | How Tim Draper’s first job picking apples made him a capitalist appeared first on National Cyber Security.

View full post on National Cyber Security

#iossecurity | #applesecurity | First Friday, Apple Festival, River Tour: Weekend Events Near HdG

Source: National Cyber Security – Produced By Gregory Evans

HAVRE DE GRACE, MD — It’s First Friday in downtown Havre de Grace. The street festival will kick off the first weekend of October with vendors, live music and more. Outside the city limits, there’s a Daven and Dine event at Temple Adas Shalom. Saturday marks the 33rd annual Darlington Apple Festival as well as Oktoberfest at the American Legion. Sunday there’s an open house at the Level Volunteer Fire Company or a cruise along the Susquehanna.

Did we miss your event? Post it on the Havre de Grace Patch calendar; instructions are at the end of the article.

First Friday

Downtown Havre de Grace will turn into a pedestrian thoroughfare from 5 to 9:30 p.m.

October Daven & Dine

Friday, October 4 at 6:00 pm

Join us on Friday, October 4th at 6:00 pm as we present our October Daven & Dine service.

Afterward attendees are encouraged to dine out together. This month we will be Dining at Liberatore’s in Bel Air, MD. RSVPs for dinner can be made at https://harfordjewishcenter.or…

Click here for more.

Havre de Grace Out of the Darkness Walk

Saturday, October 5 at 8:30 am

Registration is at 8:30 a.m. The walk starts at 10 a.m. in Tydings Park.

Oktoberfest at the Legion

Saturday, October 5 at 9:00 am

The event featuring crafters and other vendors runs from 9 a.m. to 3 p.m. at Joseph L. Davis Memorial Post.

Havre de Grace Farmers Market

Saturday, October 5 at 9:00 am

Pick up fresh produce and other goodies from 9 a.m. to noon at Hutchins Park.

Darlington Apple Festival

Saturday, October 5 at 10:00 am

Get in the autumn spirit with hayrides, apple dumplings and other fall favorites.

Community Concert Choir of Baltimore

Saturday, October 5 at 3:00 pm

Musical Concert performed by over 125 powerful voices.

Click here for more.

Havre de Haunts Tour

Saturday, October 5 at 7:00 pm

The tour runs from 7 to. 8:30 p.m.

Fire Prevention Open House In Level

Sunday, October 6 at 12:00 pm

From noon to 3 p.m., there will be fire engine rides, demos and more.


Sunday Evening Cruise

Sunday, October 6 at 5:00 pm

Join us for a tour of the lovely Susquehanna River! Visit!

Click here for more.

Kol Nidre Service

Tuesday, October 8 at 7:30 pm

Join us on October 8th at 7:30 pm for our evening Yom Kippur service, Kol Nidre.

On the eve of Yom Kippur, The Temple Adas Shalom congregation and our guests gather in our synagogue to recite the Kol Nidre declaration as we enter into the Day of Atonement.

Click here for more.

Yom Kippur Service & Programs

Wednesday, October 9 at 9:15 am

Click here for more.

“The Clean Bin Project” – Film Screening

Wednesday, October 9 at 7:00 pm

Is it possible to live completely waste-free? In this multi-award winning festival favorite, partners Jen and Grant go head-to-head in a competition to see who can swear off consumerism and produce the least garbage. Their light-hearted competition is set against a darker examination of the problem of waste.

Click here for more.

2019 Harford County Job Fair

Thursday, October 10 at 12:00 pm

2019 Harford County Job Fair

Thursday, October 10, 2019

Ripken Stadium

12:00 PM – 4:00 PM

Over (60) Businesses registered

Click here for more.

Fall in Love with Science!

Thursday, October 10 at 5:00 pm

This fall, come join us to learn all about native trees and autumn leaves! Do you know the science behind the beautiful fall colors we see adorning the trees each year? Come find out, and create your very own skeleton leaf art – just in time for Halloween! It’s $5.00 per person, and all ages are welcome to attend. The workshop falls on two different dates to accommodate as many as possible:

Click here for more.

See more on the Havre de Grace calendar!

Want to add your event? Post it on the Havre de Grace Patch calendar.

How To Post On The Havre de Grace Patch Calendar

Create a Patch account ;and sign up to post your own local content on Patch, totally free. It’s probably the easiest thing you’ll do all day.
Make a calendar event and fill it with all the info that people need to add it to their list of things to do. Choose an image to upload and most importantly, have fun with it!

Source link

The post #iossecurity | #applesecurity | First Friday, Apple Festival, River Tour: Weekend Events Near HdG appeared first on National Cyber Security.

View full post on National Cyber Security