February 2020

Cybersecurity needs unconventional hires to help lead the next phase of development and innovation, coupled with salaries that aren't insulting. Think of the hottest high-tech regions and two words likely come to mind: Silicon Valley. There’s no question that the area stretching from San Francisco to San Jose continues to be the undisputed world leader when it comes to technology innovation and development, and of course,...

Read More

A zero-trust, prevention-first approach is necessary to keep us safe, now and going forward. In the TV series Mr. Robot, Elliot Alderson, a gifted cybersecurity engineer by day, moonlights as a vigilante hacktivist for the "fsociety" group, which conspires to topple corporate America by canceling the debt records of every citizen. In this doomsday scenario, cyber anarchists aim to disrupt the financial infrastructure that supports the global...

Read More

 The U.N. confirmed the incident but there are conflicting reports whether or not data was exfiltrated as a result. If reports this week are to believed, the United Nations is still dealing with fallout around what sounds like a potentially massive breach last summer. Computer systems belonging to the U.N. - the international peace organisation founded in 1945, after World War II - were broken into in...

Read More

Safari’s anti-tracking feature could apparently give access to users’ browsing habits. An anti-tracking tool baked into Apple’s Safari web browser was found to contain flaws that, if abused, could enable the very thing that the tool was designed to prevent, according to a team of Google researchers. In a recently released report, the researchers disclosed multiple vulnerabilities in the browser’s privacy tool that could allow bad actors...

Read More

Are you looking to hide in plain sight? Here’s a rundown of three options for becoming invisible online. As concern about internet privacy grows and grows, more and more people are actively seeking to browse the web anonymously. There are various ways to avoid being identified or tracked on the internet, although, in fact, “attempt to avoid” might often be more appropriate. Online anonymity can often...

Read More

A fictitious industrial company with phony employees personas, website, and PLCs sitting on a simulated factory network fooled malicious hackers - and raised alarms for at least one white-hat researcher who stumbled upon it. S4x20 CONFERENCE - Miami - For seven months, researchers at Trend Micro ran a legitimate-looking phony industrial prototyping company with an advanced interactive honeypot network to attract would-be attackers. The goal was to...

Read More