News
-
Incentives for Utilities to monitor for hackers<p>The National Security Council plan expected out next week will offer incentives rather than regulations to encourage utilities to install monitoring software to identify hackers and report the incidents to the government. This action comes after…
-
Beware of fake NFT Websites if Counterfeit Collectibles<p> <span style="font-size:12pt"><span style="line-height:107%"><span style="font-family:"Arial",sans-serif">Non-fungible tokens known as NFTs, are now becoming the target…
-
Tac filing schemes<p> </p> <p style="margin:0in 0in 8pt"><span style="font-size:12pt"><span style="line-height:107%"><span style="font-family:"Arial",sans-serif">…
-
What looks like an Android update may be a Trojan horse<p>What looks like a new Android update may contain an information-stealing trojan horse. This spyware mimics an System Update application then takes control of compromised devices. Although not distributed through the official Google Play store,…
-
Ransomware gangs are on the rise<p style="margin:0in 0in 8pt"><span style="font-size:12pt"><span style="line-height:107%"><span style="font-family:"Arial",sans-serif">Ransomware gangs are on the rise and…
-
Sending out sensitive information via unapproved channels and apps<p style="margin:0in 0in 8pt"><span style="font-size:12pt"><span style="line-height:107%"><span style="font-family:"Arial",sans-serif">A recent global survey found that 30…
-
International Women's Day and need for more diversity in Cyber Security Workforce<p style="margin:0in 0in 8pt"><span style="font-size:12pt"><span style="line-height:107%"><span style="font-family:"Arial",sans-serif">The Rule of Steve is that in a…
-
Russians targeting US Power Grid<p style="margin:0in 0in 8pt"><span style="font-size:12pt"><span style="line-height:107%"><span style="font-family:"Arial",sans-serif">Russian hackers have targeted the US…
-
50% of apps in many industry have major vulnerabilty issues<p style="margin:0in 0in 8pt"><span style="font-size:12pt"><span style="line-height:107%"><span style="font-family:"Arial",sans-serif">A recent WhiteHat Security study…
-
Valentine's Day Phishing attack<p> </p> <p style="margin:0in 0in 8pt"><span style="font-size:12pt"><span style="line-height:107%"><span style="font-family:"Arial",sans-serif">This…
-
IBM offers Education Security Grants to 6 school systems<p style="margin:0in 0in 8pt"><span style="font-size:12pt"><span style="line-height:107%"><span style="font-family:"Arial",sans-serif">To help public school districts…
-
Predictive Intelligence for Pandemic Prevention (PIPP) Webinars<h2>Predictive Intelligence for Pandemic Prevention (PIPP) Webinars</h2> <hr> <p>February 16, 2021 11:00 AM to <br> February 17, 2021 6:45 PM<br> Virtual Workshop</p> <p><…
-
NSF 21-044 Dear Colleague Letter: Computer and Information Science and Engineering Graduate Fellowships<p><strong>NSF 21-044</strong></p> <h2>Dear Colleague Letter: Computer and Information Science and Engineering Graduate Fellowships (CSGrad4US)</h2> <hr> <p><strong>February 2, 2021</strong…
-
Cybersecurity researchers are the target of North Korean hackers<p> </p> <p style="margin:0in 0in 8pt"><span style="font-size:12pt"><span style="line-height:107%"><span style="font-family:"Arial",sans-serif">…
-
FreakOut Bot exploits Linux systems<p> A new Internet Relay Chat (IRC) called FreakOut exploited vulnerabilities to attack denial of service and cryptomining attacks on Linux systems. The bot was activated in November 2020 and already has 300 users and five channels. Once…
-
$10 Billion in new funding proposed for CISA and GSA for cybersecurity<p> </p> <p style="margin:0in 0in 8pt"><span style="font-size:12pt"><span style="line-height:107%"><span style="font-family:"Arial",sans-serif">The…