Safe Harbor on Cyber is a 'safe harbor' blog site on cyber security for families and small businesses with news on cyber threats, risk, data breach, identity thefts, ransomware, cryptocurrency, and vulnerabilities items.
CyberWisdom Commentary: Software on Apple Inc.’s iPhones and Google’s Android smartphones help mobile apps like Uber and Facebook to pinpoint a user’s location, making it possible to order a car, check in at a local restaurant or receive targeted advertising. But 911, with a far more pressing purpose, is stuck in the past. Read on
This interesting story from bizjournals.com showcases what to have your Front-line workers key to defend against cyber attacks. Read more … Engaging post, Read More… thumbnail courtesy of bizjournals.com
Today I came across this story from reuters.com that compares an obvious thing that North Korea could be involved monetization. Read more … SEOUL (Reuters) – A cybersecurity company said it has found software that appears to install code for mining cryptocurrency and sends any mined coins to a server at a North Korean university, the
CyberWisdom Commentary and Exploit Summarized: Today I came across this story from americanbanker.com that provide a status pulse on the serious chip flaw: Has either Meltdown or Spectre been exploited yet? No, says Bill Nelson, president and CEO of the FS-ISAC. “These vulnerabilities are a big deal, but there is a balance of probability and
CyberWisdom Commentary: The recent headline event by company’s data breaches violation triggered a series of bills proposed by Congress to solve the problem. The above law may require the company to pay a liquidated damages, so it is not the exact reason and result of the customer’s economic loss of economic loss, but a certain
CyberWisdomCommentary: FCW reports that finally, a Web site security requirements help the government catch up with what most commercial Web sites are already doing: using HTTPS. If you see a small “lock” icon in the corner of your browser, that means the websites you are visiting are using HTTPS – it lets you know that you
CyberWisdom Commentary: Ransomware targets the home user, business, and government networks and may result in temporary or permanent loss of sensitive or proprietary information, interruptions in normal operations, economic loss of recovery of systems and documentation, and potential damage to the reputation of the organization. Educate your staff Attackers often enter the organization by tricking
CyberWisdom Commentary: Articles from both SecurityAffair and The Register revealed that a developer named Arnau, based in Spain has published a proof-of-concept walkthrough for hacking public Wi-Fi networks to inject crypto-mining code in connected browsing sessions. CoffeeMiner is a project that allows the sort of man-in-the-middle attack that has been used by cyber thieves in Starbucks cafes and doubtless