Cybersecurity headlines in recent years have been dominated by companies losing money by being hacked and leaking the data of millions of customers. But today, cybersecurity is moving beyond the… read more at: https://www.zdnet.com/article/the-state-of-cyberwarfare-2-things-you-need-to-know/

by

Refrain from posting comments that are obscene, defamatory or inflammatory, and do not indulge in personal attacks, name calling or inciting hatred against any community. Help us delete comments that do not follow these guidelines by marking them offensive. Let’s work together to keep the conversation civil. HIDE … read more at: https://timesofindia.indiatimes.com/city/chandigarh/go-indigenous-to-fight-rise-of-the-machines/articleshow/67008641.cms

by

1. Spy friends: The Washington Post’s David Ignatius reports that Israel signed off on NSO Group’s sale of Pegasus phone hacking technology to Saudi Arabia, citing former US officials. The Saudis were widely rumored to have used the technology as part of a cyber war waged against dissidents, including Jamal Khashoggi, though it was not clear […]

by

How to secure your iPhone from hackers, snoopers, and thieves (iOS 12.1) Your iPhone and iPad is likely packed with important, valuable, and even sensitive information that you might not want others to be able to access. Here are the steps you should take … … read more at: https://www.zdnet.com/pictures/cybercrime-and-malware-2019-predictions/

by

Nozomi Networks Inc. announced its latest round of innovations to accelerate industrial cyber threat detection, thus addressing a rapidly maturing market with: A safe active choice for precise ICS network visibility A threat feed service to support advanced threat monitoring A visual GUI for improved usability and alerting More SCADAguardian deployment options – with the […]

by

On this recording you will hear from cyber threat experts and end users, who have shared their experiences in protecting against cyber threats and the ways they will stay protected in the future. By the end of the recording, you will have learned: What attacks have proven to be the most effective for cybercriminals, and […]

by

Staff monitor developments at their work stations at the National Cybersecurity and Communications Integration Center in Arlington, Virginia, Tuesday. Photo: AFP In recent years, without factual basis, some Western countries accused Chinese individuals or groups of conducting cyberattacks in an attempt to steal commercial and military secrets from other countries. The most recent example is […]

by

Russian government-affiliated actors launched coordinated cyber attacks against Ukrainian government and military targets before and during the attack and seizure of Ukrainian ships and sailors on November 25, a private intelligence firm announced this week. The attacks appeared to be aimed at stealing information that would have been relevant to planning the operation, according to Stealthcare, […]

by