Bits of Freedom is very concerned about the way the European Commission is trying to end the essence of end-to-end encryption. The day-to-day management of the EU is working on a bill that will oblige platforms to monitor your conversations. That is a direct invasion of our privacy. The interest group writes this in an opinion piece. TheContinue reading “Europe is trying to end end-to-end encryption”
Category Archives: cybersecurity
Insurers may not pay out in the event of a Russian cyber attack
Companies and organizations worldwide that are the target of Russian hackers may not be reimbursed for the damage from their insurer. If they label a cyber attack as an act of war, they don’t have to payout. The line between warfare and crime is often razor-thin. That is what various cybersecurity experts say to BNR. TensionsContinue reading “Insurers may not pay out in the event of a Russian cyber attack”
Cyberattack On Global Financial System Simulated By The IMF And Ten Countries
Israel conducted a ten-country simulation of a significant cyberattack on the global financial system on Thursday, in an effort to enhance collaboration that might help limit any possible harm to financial markets and institutions. The simulated “war game,” as Israel’s Finance Ministry dubbed it and which had been planned for over a year. Cyberattack OnContinue reading “Cyberattack On Global Financial System Simulated By The IMF And Ten Countries”
CVE-2021-44228: Apache Log4j2 Zero-Day Exploited in the Wild (Log4Shell) — Qualys Security Blog
Update December 12, 2021: An exploit for a critical zero-day vulnerability affecting Apache Log4j2 known as Log4Shell was disclosed on December 9, 2021. CVE-2021-44228: Apache Log4j2 Zero-Day Exploited in the Wild (Log4Shell) — Qualys Security Blog
Volvo target of hackers, steal confidential information — Cyber Threat Intelligence
An unknown party has managed to break into Volvo’s servers and steal confidential information. According to the car manufacturer, ‘a limited amount’ of data from the R&D department was stolen by the perpetrators. There are currently no indications that customer data has been obtained. Volvo: ‘No personal data was stolen’ according to the company. Read more usingContinue reading “Volvo target of hackers, steal confidential information — Cyber Threat Intelligence”
Social media unsuitable for children — Cyber Threat Intelligence
The Consumers’ Association believes that social media is unsuitable for children. They take little account of the vulnerability of children, violate their privacy and have few child-friendly settings. Read more. Social media unsuitable for children — Cyber Threat Intelligence
More victims at leak web host GoDaddy than expected — Cyber Threat Intelligence
Last Monday it was announced that the web host GoDaddy had been hacked. Also other brands under GoDaddy were hit by the hack on the WordPress hosting company. More victims at leak web host GoDaddy than expected — Cyber Threat Intelligence
Future wars: Artificial Intelligence, drones and cyber weapons — Insightful Geopolitics
Col SC Tyagi (Retd) has served in the Government at various levels and has served the Indian Army for more than three decades. He has authored “The Kargil Victory: Battles from Peak to Peak”, “The Fourth Estate: A Force multiplier”. Future wars: Artificial Intelligence, drones and cyber weapons — Insightful Geopolitics
How do emails get hacked?
Ways to keep hackers away from your private information. Cyber security is quickly becoming one of the most important things you can invest in. Since most of us use computers and store confidential information in them, it’s essential to keep them safe. How do emails get hacked? — Articles about this and that by Lilian
WHAT IS THE ROLE OF BLOCKCHAIN IN CYBERSECURITY? — Robert Cyrus
Entrepreneurs, policymakers and investors are increasingly adopting Blockchain technology to transform the way businesses communicate with other companies, regulators and customers. As an increasing number of companies rush towards implementing Blockchain technology, its ecosystem becomes more diverse and dynamic. Read on for views on how Cybersecurity may be impacted. WHAT IS THE ROLE OF BLOCKCHAINContinue reading “WHAT IS THE ROLE OF BLOCKCHAIN IN CYBERSECURITY? — Robert Cyrus”