Category: Cybersecurity News Page 6 of 9

Cybersecurity Report: August 11, 2015

Cyber security reportFBI Understaffed to Ward off Cybersecurity Attacks, Report Says

Last week, the U.S. Department of Justice released a report that revealed some weaknesses in Next Gen Cyber, The Federal Bureau of Investigation’s cyber security program begun in 2012. Next Gen Cyber originally has a budget of $314 million and a total of 1,333 full-time jobs (including 756 agents), while the DOJ also asked for an $86.6 million increase in funding for 2014 to support this Initiative. The FBI had in total 52 open positions of the 134 computer scientists it was authorized to employee under the Initiative.

Read More

Cybersecurity Report: August 4, 2015

Fiat Chrysler to Recall 1.4 Million Vehicles in U.S. to Prevent Hacking

FCA US LLC, formerly Chrysler Group LLC, announced on Friday that Fiat Chrysler will recall 1.4 million vehicles in US to install software to prevent hackers from gaining remote control of the engine, steering and other systems. According to federal officials, this is the first such action of its kind. This announcement was made several days after cyber security researchers succeeding in using a wireless connection to turn off a Jeep Cherokee’s engine as it drove. The National Highway Traffic Safety Administration also said on Friday that it would investigate whether FCA’s solution to upgrade software was enough to protect consumers from hackers.

Read More

Website security

Three Add-ons That Enhance Website Security

Viruses used to be the only website security issue that companies worried about. With cyberthreats increasing in variety, protecting your website is no longer about installing a basic firewall. You also need to consider the necessary add-ons in all the right places to develop a multi-layered security plan.

Add-Ons That Help Website Security

To help you start your own deployment, below are three non-firewall add-ons that you should have in order to develop a comprehensive website security plan.

Read More

Cybersecurity Report: July 21, 2015

Website SecurityOPM Director Katherine Archuleta Steps Down

Office of Personnel Management Director Katherine Archuleta resigned last Friday, a day after revealing that the recent data breach of employee information was much larger than originally thought and had probably affected 22.1 million current, former and prospective US government employees and their family members. Archuleta’s departure has been confirmed in an email she sent to OPM staff. Beth Cobert, previously the U.S. chief performance officer and a deputy director at OPM, has taken over as the acting director of OPM since last Saturday.

Army National Guard Struck by Data Breach

Read More

Cybersecurity Report: July 15, 2015

Website protection

Protect your website from hackers and cybercrime.

Hacktivist Group AnonOpsIndia Hacks BSNL Website, Days After Hacking Nation’s PAN Database

As a protest against the Indian government’s recent push on net neutrality and Digital India, AnonOpsIndia, a hacktivist group, compromised BSNL (Bharat Sanchar Nigam Limited) Telecommunications’ websites on Friday. Prior to the BSNL hack, AnonOpsIndia, usually referred as “Anonymous India,” has already compromised the nation’s PAN database and a coal-sector website last week.

Read More

Cybersecurity Report: July 7, 2015

GAO Sees Room for Improvement in Bank Cyber Security Exams

A new report from the U.S. Government Accountability Office (GAO) suggests that U.S. banking regulators must hire and train more examiners with technology expertise to give more useful cyber security recommendations to small and mid-sized banks. According to GAO, many U.S. credit unions are vulnerable to cyber threats from outside vendors that help run their businesses, because their overseer, the National Credit Union Administration (NCUA) lacks authority to review technology practices of those companies.

Read More

Cybersecurity Report: June 29, 2015

Hackers Ground Polish LOT Airline Flights

LOT, the Polish national airline, announced on Sunday that it cancelled 10 flights due to the cyber attack towards its ground computer systems at Warsaw’s Okecie airport. The cyber attack took down LOT’s ground computer systems for 5 hours during which time 10 flights were cancelled impacting over 1,400 passengers who had planned to travel to Dusseldorf, Hamburg, Copenhagen, and some internal flights within Poland.  

Read More

Cybersecurity Report: June 23, 2015

Cybersecurity Pros Warn Against Insider Threats

cybersecurity reportA recently released Insider Threat Report collected data from over 500 cybersecurity professionals to examine industrial efforts against insider threats. According to the report, although there has been a rise of insider threats over the last 12 months, organizations are not fully prepared for it yet. The report also examined which user categories showed the largest threat, the most vulnerable applications and data, common launch points for attacks, budget trends and more.

Read More

Cybersecurity Report: June 16, 2015

Senate Rejects Measure to Strengthen Cybersecurity

Cybersecurity reportSeveral days after a major breach of the personal information of federal employees, the Senate rejected a cyber security measure on Thursday. The rejected bill would encourage private 5companies to voluntarily share information about hack attacks with the federal government to prevent future data breaches. The vote was 56-40, four votes short of the 60 needed to move ahead on the legislation. Many Democrats voted against the bill, mainly because it was tacked to a sweeping defense bill, which many Democrats oppose and President Obama has threatened to veto.

Read More

https encryption

Logjam’s Effect On HTTPS Encryption

What Is Logjam?

Transport Layer Security, or TLS, is the protocol commonly used in HTTPS connections.   Logjam is the code name for a cryptographic weakness in the Diffie-Helman key exchange algorithm used by TLS. The Diffie-Helman Exchange (DHE) allows two parties – a browser and server in our case – to exchange prime numbers in a secure manner which are then used to create a shared secret used to encrypt a session.

A team of computer scientists and security researchers found that precomputing the prime number groups that DHE uses allows faster computation of the discrete logs used to find the shared secret. With academic-level resources, the researchers precomputed a 512-bit group used by 82% of vulnerable servers. The researchers posit that nation-state level resources could precompute 1024-bit Diffie-Helman groups, affecting even larger swaths of the internet.

Read More

Page 6 of 9

Powered by WordPress & Theme by Anders Norén