google-site-verification: google30a059f9a075f398.html

Month: December 2017

6 AI Cybersecurity Startups to Watch in 2018

CyberWisdom Commentary Look on AI Companies: What is most likely to be an overlooked story from nanalyze.com defines a revealing six up-coming AI cybersecurity companies… For which six companies? Read more… If 2017 has taught us anything, it’s that nothing is safe. Some poor MBA home alone for the holidays is probably still crunching the final

Cybersecurity: What Must be Done Now to Protect the Future?

securityboulevard.com sheds light on 10 Top IOT Vulnerabilities Cybersecurity, cyber-terrorism, and cyber defense are serious topics of concern for all industries, government agencies, energy, and national infrastructure entities right now and for the foreseeable future. Securing the information systems, data, and infrastructure of these Governmental, Military, and Commercial assets now is paramount. What are some

This Florida Republican directly benefitted from Russian hacks — and now he’s trying to shut down Mueller

Could someone help verify if this explosive story is true! read on… Wow!!! I couldn’t believe this story from rawstory.com that:  a Wall Street Journal report in May that revealed a Florida blogger was in direct contact during last year’s congressional campaigns with Guccifer 2.0, an internet persona that U.S. intelligence agencies believe is linked to the Kremlin. Aaron

Attackers Exploit Android Application Package Flaw to Hide Malware

CyberWisdom Commentary: A must-read story from securityboulevard.com notes that a little-known fact that an Android Security Update for December 2017 contains fixes for critical vulnerabilities that could allow an attacker to modify an installed application without affecting its signature. This will allow an attacker to access the affected device (indirectly). The researchers first discovered in July

The top 5 worst passwords of 2017 (and how to choose one that’s secure)

nbcnews.com describes an obvious fact, but still the same easily hacked password can still be found.  Strong passwords recommendation are: At least 12 characters, longer is better A mix of upper and lower case letters, plus numbers or symbols Avoid using names of people or pets, places you’ve lived, birthdays, sports teams or anything else

Web Tracking Threat Could Raise the Risk of Cybersecurity Breaches, Researchers Find

CuberWisdom Commentary: What is most likely to be an overlooked story from securityintelligence.com describes an interesting possible hidden threat. This vulnerable threat exists in browsers autofill the fields in these hidden forms with login information, such as username and passwords, without the user’s knowledge. The researchers at Princeton’s Center for Information Technology Policy found evidence that

Russian hacker claims he can prove he hacked DNC

CyberWisdom recommended read on this intriguing story claimed by the Hacker and his Group, Lurk. Read more… A jailed Russian hacker who claims he was ordered by Russian intelligence to hack into Democratic National Committee (DNC) networks says he can prove he was behind the breach.  Konstantin Kozlovsky, who has been jailed on cyber fraud charges

Why the Need for Better Built-in Security in IoT Devices

CyberWisdom Commentary: Today, any IoT device like Amazon Echo, BOSE, Google Home, Sonos that leaks personal or network information can provide the attacker with a successful attack.Attackers can track where the target is living and see if they are at home.This can be done using websites that have multiple Wi-Fi geographies. In this sample case study, we looked at