Wednesday, July 31, 2013

Cyber Security: Cyber creeps find a portal into your private life

Hackers are constantly taking advantage of Java vulnerabilities, most recently using a "drive by download" to secretly install malicious software on users' computers. Read this article for tips on how to limit your risk with Java vulnerabilities.

Tuesday, July 30, 2013

Cyber Security: Hackers can take over cars and drive them using Nintendo controllers

Read about remote control car hacks and how a pair of security experts was able to take control of a
Ford Escape and Toyota Prius using "a laptop, some software, and an old Nintendo Entertainment System gamepad."

Monday, July 29, 2013

Cyber Security: ICS-CERT Vulnerability Summary for Week of July 22

Click the link below to view the summary of cyber security vulnerabilities for the week of July 22 as collected and reported by ICS-CERT.


http://www.us-cert.gov/ncas/bulletins/SB13-210



Thursday, July 25, 2013

Cyber Security: 750 million SIM cards have programming flaws

According to this article, "up to 750 million mobile phones around the world carry SIM cards that contain a programming flaw that could leave their owners vulnerable to fraud. The bug allows a hacker to remotely access personal data and authorise illegal transactions within minutes."

Click here to read the story.


Wednesday, July 24, 2013

Cyber Security: Google glass vulnerable to WiFi hackers

Symantec warns that Google Glass still has vulnerabilities related to WiFi highjacking. Symantec says that "wearable devices by their nature can open up new attack vectors because the user interacts with them differently." Read the details here.


Tuesday, July 23, 2013

Cyber Security: Apple hacked

"Down for maintenance" since last Thursday, Apple admits it was hacked and personal details were accessed. Read the full story here.


Monday, July 22, 2013

Thursday, July 18, 2013

Cyber Security: Clickjacking

Pop-up windows that look like Adobe Flash Player technology have been spreading through social media websites such as Twitter and Facebook. Once users download the fake software, schemers take control of the user's profile. Read the article here for more information and what to do if it happens to you.

Tuesday, July 16, 2013

Cyber Security: Hackers spread malware via Wordpress and Dropbox

"The Chinese cyberspies behind the widely publicized espionage campaign against The New York Times have added Dropbox and WordPress to their bag of spear-phishing tricks." Click here to read the article.

Monday, July 15, 2013

Thursday, July 11, 2013

Cyber Security: Fruit-themed hack hits Instagram

If you're one of 130 million users on Instagram, beware of spammers "taking over accounts and sending out pictures of fruit that has text directing people to a Bit.ly hyperlink." Users who click the link are taken to a fake BBC page promoting a weight-loss coffee drink. Read the article here.

Wednesday, July 10, 2013

Cyber Security: How to increase your online privacy

With the surge in online storage use and new ways to track user activity such as reading text messages in real time, how secure can we really be? Read this article for advice on how to increase your privacy online.

Tuesday, July 9, 2013

Cyber Security: Foxboro and Triconex Global Client Conference September 10-13 in San Antonio, TX

Foxboro and Triconex Client Conference

San Antonio Marriot Rivercenter, TX
September 10-13, 2013



As a Foxboro and Triconex user, your plant is future-proofed. This year's conference is all about helping you get the most out of your existing assets, people and processes with an eye towards tomorrow. You'll have the opportunity to learn from a strong heritage of control and safety technologists; collaborate with industry experts on current challenges and user proven solutions and experience innovative technology designed to continuously evolve your plant and your business into the future.


Don’t miss keynote speaker Richard A. Clarke, internationally-recognized expert on security, including homeland security, national security, cyber security, and counterterrorism. He is currently an on-air consultant for ABC News and teaches at Harvard's Kennedy School of Government.

Register Today!

 
 


 
 

 
 
 


Cyber Security: ICS-CERT Vulnerability Summary for Week of July 1

Click the link below to view the summary of cyber security vulnerabilities for the week of July 1 as collected and reported by ICS-CERT.


http://www.us-cert.gov/ncas/bulletins/SB13-189



 

Cyber Security: Cyber attacks on the rise

Targeted attacks on businesses jumped 42 percent last year. Protect yourself from cyber attacks--check your bank statements, report fraud fast, and guard your credit cards well. Click here for more information on credit card fraud and what retailers are required to do to help prevent it.



Wednesday, July 3, 2013

Cyber Security: Password fatigue leads major companies to consider password alternatives

Of 24 nations surveyed, 40 percent of internet users don't bother with complex passwords or fail to regularly change their passwords. Several companies are working on password alternatives, such as the Yubikey, fingerprint readers, and facial recognition software. Read the article here.

Tuesday, July 2, 2013

Cyber Security: Beware of free Wi-Fi

A high school student studying cyber security shows a reporter how easy it is to hack into public Wi-Fi networks and steal user information like credit card numbers. Read the full story here.

Monday, July 1, 2013

Cyber Security: ICS-CERT Vulnerability Summary for Week of June 24

Click the link below to view the summary of cyber security vulnerabilities for the week of June 24 as collected and reported by ICS-CERT.


http://www.us-cert.gov/ncas/bulletins/SB13-182