Top CyberSecurity News For 2nd May 2016

  1. Secure Yourself & Your Business Online.From Entrepreneur.com. Businesses and their employees should not cheap out on employing the best cyber-security they have, even if they assume their data isn’t worth any hacker’s steal. Latest internet outbreaks like Ransomware can actually not just steal your data, but encrypt it and ask for money for you to use it back.

  2. Univ. of Central Florida wins college cyber defense competition. From USA Today. The National Collegiate Cyber Defense Competition, now in its 11th year, is looking to help fill the gap. This year’s, held last weekend in San Antonio, Texas, and sponsored by defense contractor Raytheon, challenged students’ knowledge, skills and responses to high-pressure situations. The winner: The University of Central Florida.

  3.  6 Steps for Responding to a Disruptive Attack. From Dark Reading. In its M-Trends 2016 report, FireEye’s Mandiant Consulting says these disruptive attacks are very different and require a different response than the “low and slow” attacks in which threat actors gain access to the victim’s network and steal information on the network for days, weeks and months before launching a full attack.
  4.  A Dramatic Rise in ATM Skimming Attacks. From KrebsOnSecurity. Skimming attacks on ATMs increased at an alarming rate last year for both American and European banks and their customers, according to recent stats collected by fraud trackers. The trend appears to be continuing into 2016, with outbreaks of skimming activity visiting a much broader swath of the United States than in years past.

  5. Learn About Man-in-the-Middle Attacks, Vulnerabilities and How to Prevent MITM AttacksFrom Veracode. A man-in-the-middle attack is a type of cyberattack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. A man-in-the-middle attack allows a malicious actor to intercept, send and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late. Man-in-the-middle attacks can be abbreviated in many ways, including MITM, MitM, MiM or MIM.
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s