through

now browsing by tag

 
 

Did #Atlanta’s #hacker get in through #City Council #software?

 – The Atlanta City Council President Thursday ordered a review of the Atlanta City Council database to determine exactly how hackers got in. Hackers continue to hold the city data hostage and demand a ransom to get it back.

Last week, members of Mayor Keisha Lance Bottom’s team informed Atlanta City Council members “a high likelihood that the incursion came through the City Council side of the building, through some software used by the Atlanta City Council called the Legislative Management System.”

The president of council and members have been told that.

Atlanta City Council President Felicia Moore said there has been no definitive word that the databases that citizens see working when regular meetings are held is the actual source where the hackers got in. Moore is asking questions about it.

“When I first heard of it, I have been doing my due diligence to ask our staff to give me any information that may be even remotely related to that. But in terms of a determination, no one has given me any firm determination,” said Moore. “Well, there are some offices that are operating. There are some that are not, and that’s across the city.”

The company involved with the software, it’s called Accela. FOX 5 News has obtained some communications between city officials and that company, in which early February there was a report of an urgent security incident in which they detected perhaps some company familiar with malware or using malware had gotten into or attempted to get into the city council computers.

That’s among the information Felicia Moore has in these emails and that’s part of her review.

FOX 5’s Morse Diggs spoke with an executive with the company, Jonathan Knight, who said he was unaware of those communications but the company is cooperating fully with the city and any law enforcement that wants to talk with them

advertisement:

The post Did #Atlanta’s #hacker get in through #City Council #software? appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Closing the #Cybersecurity #Employment #Gap Through #Diversity

One of the biggest challenges as a Chief Security Officer is finding people with the unique skills that are necessary to fight the growing threat of cyberattack. In fact, the cyber industry is one of the few in the world today that has negative employment – that is, there are more jobs than people who can fill them. A recent study conducted by Frost & Sullivan and ISC2 forecasts the negative unemployment will only grow worse. The “2017 Global Information Security Workforce Study: Women in Cybersecurity,” projects that the gap between cyber professionals and unfilled positions will expand to 1.8 million globally by 2022.

This trend is all the more concerning because cyber risk remains one of the biggest perceived threats to the safety, resiliency and stability of the global financial system for, at least, the last five years, according to DTCC Systemic Risk Barometer study, which measures and tracks risk trends among financial institutions globally. Some would also argue that cyber attacks are increasing in severity and frequency, but it could also be that organizations are being more transparent about their vulnerabilities than in the past.

The deficit in cybersecurity talent today is attributable to the rate at which governments, businesses and people have increased their digital footprint in the last decade and the rapid change in technology.

Read More….

advertisement:

The post Closing the #Cybersecurity #Employment #Gap Through #Diversity appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Government #Cybersecurity Through #Obscurity And #Paying Attention To #Data #Lifecycles

Source: National Cyber Security News

While perhaps best known for funding academic research, the US National Science Foundation (NSF) conducts many other activities, including an annual survey of doctoral graduates called the Survey of Earned Doctorates (SED). While an important data source for understanding the societal impact of doctoral education, the way in which the NSF conducts its survey offers a case study in cybersecurity through obscurity, the importance of paying attention to the entire lifecycle of data and several useful lessons to other organizations managing sensitive data in 2018.

My own experience with the SED began last month when I received four phone calls in one month from an unknown phone number late at night claiming to be a survey company working for NSF and wanting to ask me a series of questions. In this era of constant phishing attempts and scam calls, I initially assumed the calls were phishing efforts, since any NSF survey would surely be conducted from a listed phone number (though such numbers can be easily spoofed) and that the caller would have sufficient identifying information to authenticate themselves and that they actually were working on behalf of NSF.

Instead, the caller said they had no information about me other than my name, phone number and the university I graduated from and wished me to provide them a cornucopia of sensitive information of the exact kind coveted by identity thieves.

Read More….

advertisement:

View full post on National Cyber Security Ventures

Bitcoin users are opening their wallets to hackers through mobile networks

Source: National Cyber Security – Produced By Gregory Evans

Cryptocurrencies like Bitcoin make a big deal of their security; theoretically, they are almost impossible to hack. Every transaction is stored in a ‘digital ledger’, shared across multiple machines; an attacker would need to compromise every computer in the chain to successfully hack the system. However, the digital wallets that…

The post Bitcoin users are opening their wallets to hackers through mobile networks appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hacker Halted Security Conference Complimentary for Women through IBM Security Scholarship

Source: National Cyber Security – Produced By Gregory Evans

Today EC-Council and IBM announced a scholarship program for women to attend EC-Council’s Hacker Halted security conference free of charge. Funded by IBM Security, the scholarship is designed to help address the underrepresentation of women in cybersecurity and help women further their skills and expertise in this high-demand field. The…

The post Hacker Halted Security Conference Complimentary for Women through IBM Security Scholarship appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hackers could gain access to passwords through USB sticks, cyber experts warn

Source: National Cyber Security – Produced By Gregory Evans

Using a USB stick that’s been left lying around is something many, if not most, of us have done — probably without thinking twice about it. But cybersecurity experts are warning against the practice after showing hackers can access personal information through malicious USB sticks which then transmit that information…

The post Hackers could gain access to passwords through USB sticks, cyber experts warn appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Ex-school governor guilty of importing child sex doll through Stansted Airport

To Purchase This Product/Services, Go To The Store Link Above Or Go To http://www.become007.com/store/ A 72-year-old man has been found guilty of importing a child sex doll after a landmark ruling that the doll was indecent or obscene. It is not the first time such a case has come to…

The post Ex-school governor guilty of importing child sex doll through Stansted Airport appeared first on Become007.com.

View full post on Become007.com

I’ve got mates who have got married through meeting on…….

To Purchase This Product/Services, Go To The Store Link Above Or Go To http://www.become007.com/store/ I’ve got mates who have got married through meeting on Internet dating sites, so it really can work out – even if sometimes it does go disastrously wrong.   Sheridan Smith The post I’ve got mates…

The post I’ve got mates who have got married through meeting on……. appeared first on Become007.com.

View full post on Become007.com

Fraudsters target UK directors through Companies House

Source: National Cyber Security – Produced By Gregory Evans

Fraudsters target UK directors through Companies House

Company directors are twice as likely as other members of the public to be the victims of identity theft, with criminals using data in Companies House to target their victims. One-fifth of all victims of identity fraud between 2012 and 2015 were company directors, who are being “disproportionately targeted”, according…

The post Fraudsters target UK directors through Companies House appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Consumers exposing themselves to phone fraud through social media profiles

Source: National Cyber Security – Produced By Gregory Evans

Consumers exposing themselves to phone fraud through social media profiles

Consumers are falling prey to the growing risk of phone fraud. A new study warns that criminals can use information found on social media profiles to answer weak security questions, posed by banks, to gain access to accounts. This highlights the security flaws that exist within contact centres, and the…

The post Consumers exposing themselves to phone fraud through social media profiles appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures