Europe is trying to end end-to-end encryption

Bits of Freedom is very concerned about the way the European Commission is trying to end the essence of end-to-end encryption. The day-to-day management of the EU is working on a bill that will oblige platforms to monitor your conversations. That is a direct invasion of our privacy. The interest group writes this in an opinion piece. TheContinue reading “Europe is trying to end end-to-end encryption”

Insurers may not pay out in the event of a Russian cyber attack

Companies and organizations worldwide that are the target of Russian hackers may not be reimbursed for the damage from their insurer. If they label a cyber attack as an act of war, they don’t have to payout. The line between warfare and crime is often razor-thin. That is what various cybersecurity experts say to BNR. TensionsContinue reading “Insurers may not pay out in the event of a Russian cyber attack”

Cyberattack On Global Financial System Simulated By The IMF And Ten Countries

Israel conducted a ten-country simulation of a significant cyberattack on the global financial system on Thursday, in an effort to enhance collaboration that might help limit any possible harm to financial markets and institutions. The simulated “war game,” as Israel’s Finance Ministry dubbed it and which had been planned for over a year. Cyberattack OnContinue reading “Cyberattack On Global Financial System Simulated By The IMF And Ten Countries”

CVE-2021-44228: Apache Log4j2 Zero-Day Exploited in the Wild (Log4Shell) — Qualys Security Blog

Update December 12, 2021: An exploit for a critical zero-day vulnerability affecting Apache Log4j2 known as Log4Shell was disclosed on December 9, 2021. CVE-2021-44228: Apache Log4j2 Zero-Day Exploited in the Wild (Log4Shell) — Qualys Security Blog

Volvo target of hackers, steal confidential information — Cyber Threat Intelligence

An unknown party has managed to break into Volvo’s servers and steal confidential information. According to the car manufacturer, ‘a limited amount’ of data from the R&D department was stolen by the perpetrators. There are currently no indications that customer data has been obtained. Volvo: ‘No personal data was stolen’ according to the company. Read more usingContinue reading “Volvo target of hackers, steal confidential information — Cyber Threat Intelligence”

Social media unsuitable for children — Cyber Threat Intelligence

The Consumers’ Association believes that social media is unsuitable for children. They take little account of the vulnerability of children, violate their privacy and have few child-friendly settings. Read more. Social media unsuitable for children — Cyber Threat Intelligence

Future wars: Artificial Intelligence, drones and cyber weapons — Insightful Geopolitics

Col SC Tyagi (Retd) has served in the Government at various levels and has served the Indian Army for more than three decades. He has authored “The Kargil Victory: Battles from Peak to Peak”, “The Fourth Estate: A Force multiplier”. Future wars: Artificial Intelligence, drones and cyber weapons — Insightful Geopolitics

WHAT IS THE ROLE OF BLOCKCHAIN IN CYBERSECURITY? — Robert Cyrus

Entrepreneurs, policymakers and investors are increasingly adopting Blockchain technology to transform the way businesses communicate with other companies, regulators and customers. As an increasing number of companies rush towards implementing Blockchain technology, its ecosystem becomes more diverse and dynamic. Read on for views on how Cybersecurity may be impacted. WHAT IS THE ROLE OF BLOCKCHAINContinue reading “WHAT IS THE ROLE OF BLOCKCHAIN IN CYBERSECURITY? — Robert Cyrus”