Houston (832) 466-3236   |      Dallas/Ft. Worth (972) 823-4000   |      Austin (512) 642-5001

Cyber Security News

Consumer Reports to consider cyber security in product reviews

REUTERS
Consumer Reports, an influential U.S. non-profit group that conducts extensive reviews of cars, kitchen appliances and other goods, is gearing up to start considering cyber security and privacy safeguards when scoring products.

The group, which issues scores that rank products it reviews, said on Monday it had collaborated with several outside organizations to develop methodologies for studying how easily a product can be hacked…

Study finds 100% of IE and Edge vulnerabilities can be neutered by not running as Admin

by Surur 
Edge is already a pretty safe browser, but all software has flaws and vulnerabilities, meaning to be truly safe on the internet it would be a good idea to wear both belt and braces.

Security experts have long recommended that Windows users should use a non-admin account for their day-to-day computing, and now security company Avecto has released a study which shows that 100% of Edge vulnerabilities in 2016 could have been mitigated by running as a non-admin user…

Hackers Are Targeting Schools in a Wave of Tax Info Phishing Attacks

JOSEPH COX – MOTHERBOARD
It looks like hackers may be targeting more schools than last year for valuable tax info.

Hackers will target anyone and anything, be that hospitals, the police, or other hackers. Even though the year is just getting started, schools have already faced a wave of phishing attacks designed to steal sensitive employee tax information, according to a consultancy focused on education and technology…

Cyber security readiness study finds widespread shortcomings

Hiscox Ltd
A study of 3,000 companies in the UK, US and Germany, conducted for specialist insurer Hiscox, reveals that more than half (53%) of businesses in the three countries are ill-prepared to deal with cyber-attacks. The Hiscox Cyber Readiness Report 2017 assessed firms according to their readiness in four key areas – strategy, resourcing, technology and process – and ranked them accordingly. While most companies scored well for technology, fewer than a third (30%) qualified as ‘expert’ in their overall cyber readiness…

WikiLeaks releases new CIA documents describing Mac exploits


5 shocking new threats to your personal data


I don’t mean to alarm you, but these trends make panic sound like a good idea.

I’m not paranoid. Tinfoil hats aren’t my scene.

But watch out! In just the past month, the internet and smartphones have come up with five new and surprising ways to steal or expose our personal data.

Of course, these new concerns can now be added to all the old ones. Companies like Google and Facebook still track you and harvest personal data. Hackers still want to steal your data. And the National Security Agency is still out there doing its thing…

How to practice cybersecurity (and why it’s different from IT security)


Cybersecurity isn’t about one threat or one firewall issue on one computer. It’s about zooming out and getting a bigger perspective on what’s going on in an IT environment.

Keeping companies safe from attackers is no longer just a technical issue of having the right defensive technologies in place. To me, this is practicing IT security, which is still needed but doesn’t address what happens after the attackers infiltrate your organization (and they will, despite your best efforts to keep them out).

I’m trying to draw attention to this topic to get security teams, businesses executives and corporate boards to realize that IT security will not help them once attackers infiltrate a target. Once this happens, cybersecurity is required…

Detecting a Cyberattack with the Microsoft Operations Management Suite


This 30 minute video demonstrates how cyberattacks occur and how the Microsoft Operations Management Suite Security Solution and Advanced Threat Analytics can be used to both detect and respond to these attacks.  This is a 300-400 level technical drilldown where real attacks are executed using real penetration testing (“hacking”) tools to access systems which are monitored by OMS and ATA.  The demo then shows how the attack would have been detected by OMS and ATA.  If you’ve ever wondered if the Microsoft Intelligent Security Graph and our advanced detection tools built on machine learning actually work, this video will show you they do!

Android malware: 38 new phones and tablets found to be pre-installed with virus before being sold

The issue affects smartphones from a number of big-name brands, including Samsung, LG and Google

Aatif Sulleyman – The Independent
Over 30 different Android smartphones and tablets have been found to have had malware preinstalled on them before users even switched them on, according to a cyber security firm.

Check Point detected a “severe infection” on 38 handsets being used by two of its corporate clients, a telecommunications firm and a multinational technology company that have not been named…

There’s no such thing as a free lunch: Why business needs to understand cloud threats

The issue affects smartphones from a number of big-name brands, including Samsung, LG and Google

Businesses across the country have bought into the extraordinary benefits of cloud computing. Senior executives have become passionate advocates, attracted by the promise of greater agility, cost savings and convenience. It is no surprise that global spending on public cloud services will reach $141bn by 2019. But business leaders are less well informed when it comes to the risks the cloud can introduce to enterprise environments…

How to transition from consumer to small-business computer security

 – 
How is the average small business like a cybersecurity home consumer? They’re similar not only in the kinds of threats they face, but also in the resources and tools they need to defend themselves.

When my co-founder, Nipul Patel, and I started Townsquared in the summer of 2013 to better connect local small businesses to one another, our bank, Wells Fargo, insisted that we use a hardware dongle called an RSA key to prove our identities every time we wanted to wire cash to our contractors.

The unique six-digit code the key generated—a security technique called two-factor authentication—verified that I was exactly who I said I was. I must confess that before we went down the startup road and opened our first corporate accounts, I never would have considered using the key…

CONTACT

Free your time and start focusing

on your business now!

We’ll take care of the rest.

New to site? Create an Account


Login

Lost password?
(close)

Already have an account? Login


Signup

(close)