logoSign upLog in
Cybersecurity - beBee

Cybersecurity

~ 100 buzzes
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.
Buzzes
  1. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    LastPass hit by password stealing and code execution vulnerabilities | ZDNet
    www.zdnet.com Google cyber-sleuth Tavis Ormandy has returned to examining LastPass, and a new lot of vulnerabilities have been...
    Relevant
  2. Jaime Contreras, MBA, CISM, CISA
    #Ransomware
    Jaime Contreras, MBA, CISM, CISA
    Top 5 Android Ransomware Threats
    cyware.com Although most of the general internet users relate malware and ransomware threats with the computers, very few know that mobile devices are no exception. In fact, a majority of people are using smartphones in place of the computer to do their...
    Relevant
  3. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    RSA announces new risk & cybersecurity practice | Networks Asia
    www.networksasia.net RSA has announced the new RSA Risk & Cybersecurity Practice that is inclusive of access to RSA technologies and expertise in critical practice...
    Relevant
  4. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    The Map of Cybersecurity Domains
    www.securitycurrent.com
    Relevant
  5. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Forbes Welcome
    www.forbes.com The bad news is that the MacOS's reputation for mythical-level security is only true if 'mythical' is understood as imaginary rather than legendary. The good news is that it's an easy problem to...
    Relevant
  6. ProducerBob Carver

    Bob Carver

    23/03/2017
    SC Magazine Virtual Conference - Leveraging Threat Intelligence
    SC Magazine Virtual Conference - Leveraging Threat IntelligenceTo see this Virtual Conference follow this...
    Relevant
  7. Jaime Contreras, MBA, CISM, CISA
    #Ransomware, #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Ransomware operators are hiding malware deeper in installer packages
    blogs.technet.microsoft.com We are seeing a wave of new NSIS installers used in ransomware campaigns. These new installers pack significant updates, indicating a collective move by attackers to once again dodge AV detection by changing the way they package malicious code....
    Relevant
  8. Jaime Contreras, MBA, CISM, CISA
    #Malvertising, #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Still Getting Served: A Look at Recent Malvertising Campaigns Involving Exploit Kits « Threat Research Blog
    www.fireeye.com FireEye researchers showcase some of the prominent malvertising campaigns active over the last four months, as well as the cushion servers related to different exploit...
    Relevant
  9. Jaime Contreras, MBA, CISM, CISA
    #Phishing, #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Latest phishing tactics: infected PDFs, bogus friend requests, fake HR emails
    nakedsecurity.sophos.com The bad guys have always got new tricks up their sleeves: here are some tips to help you steer clear of...
    Relevant
  10. Jaime Contreras, MBA, CISM, CISA
    #CyberSec, #GRC
    Jaime Contreras, MBA, CISM, CISA
    New York Cyber Security Law Emphasizes Governance, Risk & Compliance – Continuum GRC
    medium.com The first phase of the New York state cyber security regulations, which apply to insurance companies, banks, and other...
    Relevant
  11. Jaime Contreras, MBA, CISM, CISA
    #Malware
    Jaime Contreras, MBA, CISM, CISA
    A Google Chrome scam is tricking users into emailing their credit card details to criminals
    www.independent.co.uk Cybercriminals have created a malicious app designed to trick unsuspecting Chrome users into giving away their credit card details.  The malware, which has been dubbed ‘Betaling - Google Chrome’, does a pretty convincing job of imitating Google’s...
    Relevant
  12. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Winning the security game with intelligence | Networks Asia
    www.networksasia.net We find out how actionable, relevant and timely threat intelligence can help APAC businesses gain the Clarity, Context and Control that they need to live up to the pace of today’s digital...
    Relevant
  13. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Revolutionising the cyber-security skills gap with ‘ethical hacking’
    www.businesslive.co.za With a dire shortage in skilled IT staff, our raw talent needs to be developed to create the next generation of security professionals, writes Riaan van...
    Relevant
  14. Jaime Contreras, MBA, CISM, CISA
    #IoT, #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Mirai is the hydra of IoT security: too many heads to cut off
    www.cio.com Efforts to stop Mirai, a malware found infecting thousands of IoT devices, have become a game of whack-a-mole, with differing opinions over whether hackers or the security community are making any...
    Relevant
  15. Jaime Contreras, MBA, CISM, CISA
    #HIPAA, #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    A Breakdown of the Second Largest HIPAA Fine to Date – $5.5 Million
    www.tripwire.com On February 16, 2017, the Office of Civil Rights announced that it had entered into a settlement agreement with MHS to settle potential violations of...
    Relevant
  16. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    citadel-information.com CitadelOnSecurity CyberSecurityManagement CyberCrime CyberDefense FinancialCyberSecurity IdentityTheft CyberPrivacy NationalCyberSecurity...
    Relevant
  17. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Cyber threats banks face in 2017
    www.enterpriseinnovation.net As banks race to introduce digital channels, whether alone or in partnership with Fintech startups, they are becoming magnets to new threat actors. F5 offers some options for...
    Relevant
  18. Jaime Contreras, MBA, CISM, CISA
    #InfoSec, #Adware
    Jaime Contreras, MBA, CISM, CISA
    Sneaky adware exploits Android users with precision targeting | ZDNet
    www.zdnet.com Skinner Adware went undiscovered for two months, thanks to subtle tactics which saw it base adverts on which apps 10,000 infected victims were using at that...
    Relevant
  19. Jaime Contreras, MBA, CISM, CISA
    #InfoSec, #FIM
    Jaime Contreras, MBA, CISM, CISA
    FIM: A Proactive and Reactive Defense against Security Breaches
    www.tripwire.com FIM helps organizations monitor, detect, and manage all changes with the goal of answering the question: "Are systems still in a secure and trusted...
    Relevant
  20. Jaime Contreras, MBA, CISM, CISA
    #InfoSec, #PUP
    Jaime Contreras, MBA, CISM, CISA
    Remove the Advanced PC-Fixer PUP
    www.bleepingcomputer.com Advanced PC-Fixer is a potentially unwanted program that scans Windows for malware, system performance issues, software issues, and startup issues. When Advanced PC-Fixer scans a computer it will list a variety of detected issues, but in order to...
    Relevant
  21. Jaime Contreras, MBA, CISM, CISA
    #Privacy, #DataSec
    Jaime Contreras, MBA, CISM, CISA
    5 things you should never send over email or text if you don't want your identity to be stolen
    www.businessinsider.com Don't become a victim of identity theft. Avoid sending certain things over text and email to stay in the...
    Relevant
  22. Jaime Contreras, MBA, CISM, CISA
    #IoT
    Jaime Contreras, MBA, CISM, CISA
    The State of the Union for IoT — or Not?
    www.govtech.com There are currently two radically different views regarding the Internet of Things (IoT) in our world. One is bright. The other is dark. Which one will win out? Can they come together — somehow? Here are two opposing perspectives — followed by a...
    Relevant
  23. ProducerNeil Hughes

    Neil Hughes

    11/03/2017
    The Technology Behind Most Crime
    The Technology Behind Most CrimeOver the years, we have become incredibly streetwise when protecting ourselves from crime. Our homes are often fitted with specialist alarms and locks to keep the bad guys away. A combination of our natural instincts and general self-awareness also...
    Relevant

    Comments

    Donna-Luisa Eversley
    13/03/2017 #1 Donna-Luisa Eversley
    @Neil Hughes this is a great eye opener. We are online much more now and certainly more vulnerable to cyberstalking and hacking crimes. Thanks for sharing!
  24. Jaime Contreras, MBA, CISM, CISA
    #Malware
    Jaime Contreras, MBA, CISM, CISA
    Microsoft Excel Files Increasingly Used To Spread Malware
    blog.fortinet.com Over the last few years we have received a number of emails with attached Word files that spread malware.  Now it...
    Relevant
  25. Jaime Contreras, MBA, CISM, CISA
    #Malware
    Jaime Contreras, MBA, CISM, CISA
    Why is Windows malware cropping up in Android apps?
    nakedsecurity.sophos.com Infected apps are probably themselves victims of malware, say Sophos Labs...
    Relevant
See all