Safe Harbor on Cyber is a 'safe harbor' blog site on cyber security for families and small businesses with news on cyber threats, risk, data breach, identity thefts, ransomware, cryptocurrency, and vulnerabilities items.
CyberWisdom Commentary Look on AI Companies: What is most likely to be an overlooked story from nanalyze.com defines a revealing six up-coming AI cybersecurity companies… For which six companies? Read more… If 2017 has taught us anything, it’s that nothing is safe. Some poor MBA home alone for the holidays is probably still crunching the final
securityboulevard.com sheds light on 10 Top IOT Vulnerabilities Cybersecurity, cyber-terrorism, and cyber defense are serious topics of concern for all industries, government agencies, energy, and national infrastructure entities right now and for the foreseeable future. Securing the information systems, data, and infrastructure of these Governmental, Military, and Commercial assets now is paramount. What are some
Could someone help verify if this explosive story is true! read on… Wow!!! I couldn’t believe this story from rawstory.com that: a Wall Street Journal report in May that revealed a Florida blogger was in direct contact during last year’s congressional campaigns with Guccifer 2.0, an internet persona that U.S. intelligence agencies believe is linked to the Kremlin. Aaron
CyberWisdom Commentary: A must-read story from securityboulevard.com notes that a little-known fact that an Android Security Update for December 2017 contains fixes for critical vulnerabilities that could allow an attacker to modify an installed application without affecting its signature. This will allow an attacker to access the affected device (indirectly). The researchers first discovered in July
nbcnews.com describes an obvious fact, but still the same easily hacked password can still be found. Strong passwords recommendation are: At least 12 characters, longer is better A mix of upper and lower case letters, plus numbers or symbols Avoid using names of people or pets, places you’ve lived, birthdays, sports teams or anything else
CuberWisdom Commentary: What is most likely to be an overlooked story from securityintelligence.com describes an interesting possible hidden threat. This vulnerable threat exists in browsers autofill the fields in these hidden forms with login information, such as username and passwords, without the user’s knowledge. The researchers at Princeton’s Center for Information Technology Policy found evidence that
CyberWisdom recommended read on this intriguing story claimed by the Hacker and his Group, Lurk. Read more… A jailed Russian hacker who claims he was ordered by Russian intelligence to hack into Democratic National Committee (DNC) networks says he can prove he was behind the breach. Konstantin Kozlovsky, who has been jailed on cyber fraud charges
CyberWisdom Commentary: Today, any IoT device like Amazon Echo, BOSE, Google Home, Sonos that leaks personal or network information can provide the attacker with a successful attack.Attackers can track where the target is living and see if they are at home.This can be done using websites that have multiple Wi-Fi geographies. In this sample case study, we looked at
CyberWisdom Curated Identity Theft Is a Business Validation Equifax data has not started to spread on dark networks in any discernible manner. If this happens, it does not matter to criminals from Equifax. It does not matter, this is your data or my data – this information is just new fuel. Identity theft as a
CyberWisdom Lesson learned from Google study finding: average, 9 million logins are stolen every 24 hours The original curated post is from Safe Harbor on Cyber.com securityboulevard.com The Google search giant’s findings are astounding and instructive study. From March 2016 to February 2017, Google found 12 million usernames and passwords were successfully phished and 3.3 billion