Thursday, October 22, 2015

Business Continuity vs. Disaster Recovery; What’s the Difference?

There’s no doubt that there is overlap between Business Continuity (BC) and Disaster Recovery (DR) tools and planning. However, each one exists independent of the other. Companies can choose to focus more on one or the other, but to be completely prepared, having both a Business Continuity plan and a Disaster Recovery plan ensures complete coverage should the unthinkable happen.

Have Employees Become the Biggest Threat to Enterprise Data?

66% of companies now believe that careless employees are a larger risk to enterprise data than cyber criminals (Check Point Software Technologies). In this article I outline the steps a business should take in order to minimize dangerous internal threats. Feel free to share and comment--I always welcome feedback.

Android.Fakelogin Trojan Targeting Banking Apps

tripwire.com

Researchers have identified a new Trojan that targets mobile banking apps with customized phishing pages in an attempt to steal users' login credentials.

Cybersecurity firm: Chinese Hacking On US Companies Persists

Chinese hacking attempts on American corporate intellectual property have occurred with regularity over the past three weeks, suggesting that China almost immediately began violating its newly minted cyber agreement with the United States, according to a newly published analysis by a cybersecurity company with close ties to the U.S. government.

Reference:

Friday, October 9, 2015

Uber Finally Fixed a Bug that Let Hackers Keep Control of Hacked ...
Motherboard-10 hours ago
Uber just fixed a major security issue that allowed hackers to maintain access to compromised accounts even after the victim had changed his ...


When hackers talk, this research team listens
Phys.Org-12 hours ago
If you're researcher Hsinchun Chen, you gather as much data as you can on the hackers. Chen, a professor of management information ...


Codoso Group Hackers Breach Samsung Subsidiary LoopPay
eSecurity Planet-12 hours ago
A Chinese hacking team known as the Codoso Group or the Sunshock Group breached the network of Samsung subsidiary LoopPay earlier ...
Was Samsung Pay Hacked? What Users Need to Know
TheStreet.com-9 hours ago
Explore in depth (9 more articles)


China Cyberspying on U.S.After No-Hacking Deal
Daily Beast-9 hours ago
The hackers have been observed collecting credentials and moving “laterally through the network” of their victims, the alert said, meaning that ...


Exclusive: Hackers try to extort money from well-known Phoenix ...
Phoenix Business Journal-19 hours ago
FBI Special Agent and spokesman Kurt Remus said the hacking is under investigation and extends beyond Streets of New York.


Our Main Weapon Against Hackers Is A 30-Year-Old Law
Huffington Post-5 hours ago
In December 2010, a group of hackers logged into the Los Angeles Times' website and altered an article about tax policy, essentially turning ...

Why the Government Went After Matthew Keys
Highly Cited-Motherboard-12 hours ago
Explore in depth (22 more articles)


Chinese Hackers Breached LoopPay, Whose Tech Is Central to ...
New York Times-Oct 7, 2015
As early as March, the hackers — alternatively known as the Codoso Group or Sunshock Group by those who track them — had breached the ...

Chinese hackers breached LoopPay, the company behind Samsung ...
In-Depth-Fortune-Oct 7, 2015
Explore in depth (218 more articles)


Report: Hackers in China Tried to Attack Clinton's Server
Newsweek-Oct 8, 2015
Computer hackers in China, South Korea and Germany tried to attack Democratic presidential candidate Hillary Clinton's private email server ...

Hackers Targeted Hillary Clinton's Private Servers (Obviously)
Opinion-Gizmodo-Oct 8, 2015
Explore in depth (97 more articles)

Vigilante Team White hackers admit to infecting 300000 devices
TechTarget-9 hours ago
Team White hackers have taken credit for infecting more than 300,000 devices with the Wifatch malware designed to harden security, but ...

Washington Post
Journalist found guilty for aiding computer hackers
Reuters-Oct 7, 2015
A story on the Tribune's Los Angeles Times website was soon altered by one of those hackers, the indictment said. Tor Ekeland, an attorney for ...

'Beyond disgusting,' says journalist Matthew Keys of his hacking ...
In-Depth-Washington Post-Oct 8, 2015
Daily Mail

Don't throw out your boarding pass. Hackers can use it to access ...
WTSP 10 News-16 hours ago
After you hand the gate agent your boarding pass to scan and head back onto the plane, there's a pretty good chance you quit paying attention ...

How hackers can steal your private details every time you post an ...
Daily Mail-19 hours ago

Lawmakers push to protect trade secrets from Chinese hackers
The Hill-10 hours ago
Lawmakers are pushing for legislation that would give companies the right to take legal action in federal court against cyber thieves who steal ...

Clinton e-mails were vulnerable to hackers, tech firm warned
Washington Post-Oct 7, 2015
A technology subcontractor that has worked on Hillary Rodham Clinton's e-mail setup expressed concerns over the summer that the system ...

Clinton email server reportedly target of cyberattacks from China ...
In-Depth-Fox News-Oct 7, 2015

Hackers zero in on boarding passes
WTSP 10 News-Oct 8, 2015
If passengers drops it, leaves it in on the plane, or ditches it an airport trash can, a hacker can use a bar scanning app on any smartphone to get ...

Police issue warning after hackers use handheld device to break ...
Fox 59-2 hours ago
The device allows hackers to steal the code and come back when you're not home. Wireless keys to your house that are easy to fund for cheap ...

Congressman: Chinese hackers tried to steal my identity
Washington Post (blog)-Oct 7, 2015
Intelligence and White House officials have characterized the thefts, particularly the hacking of background investigation files, as political ...

The Register
Journalist who allegedly helped hackers makes final pitch to jury
Reuters-Oct 6, 2015
(Reuters) - A lawyer for journalist Matthew Keys, accused of aiding members of the Anonymous hacking collective, told a jury on Tuesday that ...

In a first, Chinese hackers are arrested at the behest of the U.S. government


Story image for hacker news from Washington Post
In a first, Chinese hackers are arrested at the behest of the US ...
The Chinese government has quietly arrested a handful of hackers at the urging of the U.S. government — an unprecedented step to defuse ...