Cybersecurity | SC Media Cybersecurity

Cybersecurity

Tips for those of all ages interested in pursuing a career in cybersecurity

Today, we are facing a frightening shortage of cybersecurity professionals in the workforce. Specifically, this widening gap is expected to lead to 3.5 million jobs left unfilled, according to Cybersecurity Ventures, in the cybersecurity profession by 2021. The month of October is National Cybersecurity Awareness Month, which aims to raise awareness about the importance of…

Baltimore belatedly buys cyberinsurance

In what could be the poster child case for closing the barn door after the horse has left, the Baltimore City Council has approved the purchase of cyber insurance, six months after the municipality suffered a damaging ransomware attack. The Baltimore Sun reported the city conducted a bidding process and selected two plans. “The first…

CyberRisk Alliance appoints Malcolm Harkins to its board

Former Intel Security Chief and Cybersecurity Expert New York, NY, October 10, 2019 — CyberRisk Alliance (“CRA”), a business intelligence company serving the cybersecurity and information risk management marketplace, today announced the appointment of cybersecurity expert Malcolm Harkins to its board of directors. Harkins brings a depth of experience, a broad network, and an acute…

Google launches Password Checkup security tool

Google has added a new feature to its password manager that will study a person’s passwords and then inform them on its strength and whether it has been compromised. Password Checkup will not only check a user’s personal choices, but also make personalized recommendations, wrote Andreas Tuerk, product manager for Password Manager. The three primary…

“Cybersecurity as realpolitik”

27 nations ink cybersecurity pledge

Twenty-seven nations signed a statement today reaffirming their commitment to constructing a framework for responsible state behavior in cyberspace. The statement, Advancing Responsible State Behavior in Cyberspace, created a framework for the nations to show their continuing support for the international rules-based order, and encourage its adherence, implementation and further development, including at the ongoing…

Kaspersky releases decryptors for FortuneCrypt and Yalon ransomware

Yalon, which is based on the open-source ransomware Hidden Tear, has been primarily used to hit targets in Germany, China, the Russian Federation, India and Myanmar, Kaspersky noted. Luckily, Yalon’s creator made the mistake of using a third-party malware without checking for vulnerabilities and due to mistakes in the cryptographic scheme Kaspersky said it was…

Millions of YouTube accounts hijacked through phishing and compromised 2FA

Cybersecurity executives blamed YouTube’s continued use of multifactor authentication and relying on user credentials instead of more advanced forms authentication as the reasons behind why millions of accounts were hijacked over the last few days. The attackers used phishing attacks that convinced account owners to give up their Google account login credentials, used that information…

In cybersecurity speed kills, but faster saves

The 2019 Verizon Data Breach Investigations Report (DBIR) came out not long ago. There are a lot of incremental change in the 78 pages of charts and graphs, which is normal for a report of this kind. The DBIR isn’t rocking anyone’s boat with blockbuster findings; instead, it reveals trends that may or may not be comforting.…

flashlightcell

Avast places flashlight apps’ permission requests in the spotlight

An Avast researcher shed some light on the number and invasiveness of the permissions requested by various publishers to download and install their flashlight app. The security firm’s analyst Luis Corrons looked at 937 Android flashlight apps available and found on average each required 25 permissions ranging from the basic and obvious need to access…

Next post in Privacy & Compliance News and Analysis