from SweetTech https://www.wired.com/2017/04/security-news-week-yeah-carrier-steaming-toward-north-korea/
Saturday, April 29, 2017
Security News This Week: Yeah, About That Carrier Steaming Toward North Korea
from SweetTech https://www.wired.com/2017/04/security-news-week-yeah-carrier-steaming-toward-north-korea/
The US Takes On the World in NATO’s Cyber War Games
from SweetTech https://www.wired.com/2017/04/us-takes-world-natos-cyber-war-games/
Cybersecurity is now as important as health and safty

Cybersecurity is now as important as health and safety for any company
Cyber security is quickly becoming a global issue now affecting businesses and organizations of all sizes around the world. Every employee is at risk at all levels of an organization. The time has come for organizations and businesses to see cybersecurity as an extremely important issue and consider it on par with health and safety issue.
Enterprises need to raise the awareness of cyber security and make a part of normal campaigns that also spread awareness of health and safety. Why?
Because let’s face it, today is a connected world. Our computers, our televisions and even our fridges are now connected to the network and the internet. Even medical devices such as pacemaker are now connected to some sort of a smart device, leaving it open to attack from cyber criminals. This is why cyber security should now become a part of any health and safety campaign.
Businesses don’t realize how much it is important to boost cyber security in the workplace. It has become increasingly important to protect your workspace simply because of the adverse effects a cyber crime can cause to existing aspects of any business. Cyber crimes have and will continue to put companies out of business if the issue is not taken seriously. Any data breach, system lock or other cyber attacks can cause a business to be heavily fined by data protection authorities if found that they did not implement a core cyber security strategy.
This has caused many sensible businesses and organizations to implement a core cyber security strategy where they conduct regular training and awareness programs so that everyone knows how much dangerous the threats can be if not taken seriously.
Statistics show that 38% of data breaches are internal. It reveals that companies are in fact ignoring employee awareness that is causing breaches due to their negligence. So the first step is to spread awareness internally so all of the employees in a company understand how to protect themselves and the company from cyber criminals.
Since cyber criminals are taking advantage of the latest technology to conduct their attacks, companies should step up their game and make use of advanced defensive technology to fight back, which can only be done if there is enough awareness so that everyone can take this issue seriously.
The post Cybersecurity is now as important as health and safty appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/cybersecurity-now-important-health-safty/
via The Cyber Security Portal
A Big Change in NSA Spying Marks a Win for American Privacy
from SweetTech https://www.wired.com/2017/04/big-change-nsa-spying-marks-win-american-privacy/
Amazon’s ‘Echo Look’ Could Snoop a Lot More Than Just Your Clothes
from SweetTech https://www.wired.com/2017/04/amazon-echo-look-privacy/
An Obscure App Flaw Creates Backdoors In Millions of Smartphones
from SweetTech https://www.wired.com/2017/04/obscure-app-flaw-creates-backdoors-millions-smartphones/
Friday, April 28, 2017
Insecure by default? What users need to know before they put company documents in the cloud
from SweetTech http://feedproxy.google.com/~r/TalkTechToMe-All/~3/Z6UzzV13gS0/
A Clever Plan to Secure the Internet of Things Could Still Have Big Drawbacks
from SweetTech https://www.wired.com/2017/04/clever-plan-fix-iot-security-still-drawbacks/
The Genial, Brilliant, Candy-Loving Hackers of Stetson West
from SweetTech https://www.wired.com/2017/04/the-genial-brilliant-candy-loving-hackers-of-stetson-west/
The Breast Pump Finally Joins the 21st Century
from SweetTech https://www.wired.com/2017/04/building-a-better-breast-pump/
Oh Great, Now Alexa Will Judge Your Outfits, Too
from SweetTech https://www.wired.com/2017/04/oh-great-now-alexa-will-judge-outfits/
Thursday, April 27, 2017
New Buy Only American Rule Could Seriously Hurt Pentagon Tech Buying

Cybersecurity firm has enough evidence to believe Chinese hackers tried to hack US-built missiles
Ex-officials from the Pentagon are warning that newly tightened ‘Buy American’ rules that ask the government to buy U.S made only products could seriously hurt the military’s ability to buy technology which is often not necessarily made in America.
The issue was raised at the house hearing about Pentagon’s IT operations. The hearing took place one week after President Donald Trump revealed his Buy American and Hire American order.
This could seriously limit the ability to get the best weapon systems for the warfighters. The hearing mostly agreed on the fact that it could seriously hamper technology buying at the Pentagon.
The post New Buy Only American Rule Could Seriously Hurt Pentagon Tech Buying appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/new-buy-american-rule-seriously-hurt-pentagon-tech-buying/
via The Cyber Security Portal
China May Have Tried To Hack Missile Defense System

Trump’s Buy America, Hire America order could hinder Pentagon’s tech buying
A cybersecurity company in the U.S have reason enough to believe that Chinese hackers sponsored by the state could have tried to hack into an organization that had close connections with the US-built missile system based in South Korea.
According to a spokesperson from the company, China is pretty involved in cyber espionage regularly. He also said that they have enough evidence to prove that the Chinese hackers targeted at least one party that has connections with the missile placements.
According to him, prompt defensive measures placed in the organization helped prevented the attack.
The post China May Have Tried To Hack Missile Defense System appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/china-may-tried-hack-missile-defense-system/
via The Cyber Security Portal
Wednesday, April 26, 2017
Transcribing Audio Sucks—So Make the Machines Do It
from SweetTech https://www.wired.com/2017/04/trint-multi-voice-transcription/
How to Stream Live Television Without Paying for Cable
from SweetTech https://www.wired.com/2017/04/stream-live-television-without-paying-cable/
Review: iWalk2.0
from SweetTech https://www.wired.com/2017/04/review-iwalk2-0/
The 10-Year Quest to Make Your Phone Do Everything
from SweetTech https://www.wired.com/2017/04/10-year-quest-make-phone-everything/
The biggest cybersecurity threats to businesses

The biggest cyber security threats to businesses these days.
With phishing emails at their highest right now, business email compromise (BEC) is costing billions in damages since 2015. It has become more than crucial for companies to be aware of how hackers attack and how they can compromise your business.
BEC basically has an actor pretending to be a senior of the company and requesting the colleague in that company into wiring a fixed amount of money for a top secret company information. Phishing is quite threatening because many people don’t bother asking questions, they do just as told in the email.
Even if the highest security is placed, humans are easy to trick and someone clever enough can easily get past those security measures and make a fool out of someone.
Social media itself has also become quite a big threat to many businesses. Phishing is happening on social media in full force these days. People assume a role of someone senior by stealing a profile and through that they can easily request someone to send them money in the company. The only way to save from social media scams is to make sure good security is in place and awareness is spread across the employees.
Businesses can only defend themselves against these phishing attacks by spreading awareness. Occasional conferences should take place with training programs teaching the employees the fundamentals of cyber security, the threats it poses and how to recognize simple cyber attacks like phishing on email, phone, and social media.
After all, if one employee is hacked in a company, it would allow the hacker to easily get information about other systems connected to the network. that means in a short time span, a hacker would be able to hack the entire network and steal off data. They may even inject spyware to collect important data and release it to competitors.
Every company should once again think about where their cyber security strategy is taking them. They should invest more in it so they can protect themselves from such attacks.
The post The biggest cybersecurity threats to businesses appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/biggest-cybersecurity-threats-businesses/
via The Cyber Security Portal
Uber Didn’t Track Users Who Deleted the App, But It Still Broke the Rules
from SweetTech https://www.wired.com/2017/04/uber-didnt-track-users-deleted-app-still-broke-rules/
How to Stop Services Like Unroll.me From Snooping on Your Gmail
from SweetTech https://www.wired.com/2017/04/stop-services-like-unroll-snooping-gmail/
Just a Pair of These $11 Radio Gadgets Can Steal a Car
from SweetTech https://www.wired.com/2017/04/just-pair-11-radio-gadgets-can-steal-car/
Tuesday, April 25, 2017
An important shift in Microsoft’s email hygiene approach
from SweetTech http://feedproxy.google.com/~r/TalkTechToMe-All/~3/ANqxoTpVooE/
Worlds First Container Based Cybersecurity platform released

world’s first container based cybersecurity platform
tuCloud Federal Inc. announced today that they have launched the world’s first-ever container based cyber security platform. It is designed to physically set the web browsing activity aside from others which will help protect users from dangerous internet threats like malware and viruses.
The new platform is called Safeweb Engine and is a physical isolation platform which was built with help from Sandia National Laboratory. It is based on the proven safe web model that was originally developed by the same company.
The safeweb engine can be installed on a cloud, virtual and physical servers.
The post Worlds First Container Based Cybersecurity platform released appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/worlds-first-container-based-cybersecurity-platform-released/
via The Cyber Security Portal
KPMG Is Going To Hold A Cyber Security Conference

Cyber Security conference to be held by KPMG
In order to educate and spread awareness of cyber security for organizations asking them to build a more resilient system that would fight back cyber risks, KPMG is going to hold a conference.
The conference will be aimed at discussing various cyber security subjects. It will also shed light on how cyber security affects organization when technology fails due to shortcomings in their cyber security strategy.
Cyber security has already been started taken seriously by developing countries, so it should also become a part of countries that are underdeveloped to prepare for future.
The post KPMG Is Going To Hold A Cyber Security Conference appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/kpmg-going-hold-cyber-security-conference/
via The Cyber Security Portal
Game On - International TableTop Day 2017
from SweetTech http://www.bbc.co.uk/programmes/p0511qfx
Sunday, April 23, 2017
All About the US Missile Defense That’ll Protect South Korea—And Tick Off China
from SweetTech https://www.wired.com/2017/04/missile-defense-will-protect-south-korea-make-china-nervous/
What Has F8 in Store for Me?
from SweetTech https://www.wired.com/2017/04/gadget-lab-podcast-313/
How to Set Up a Room in Your Home Just for VR
from SweetTech https://www.wired.com/2017/04/how-to-make-a-vr-room/
Make Movie Night a Blockbuster With This Fully-Loaded TV Room
from SweetTech https://www.wired.com/2017/04/best-home-theater-gear/
Let There Be Light: 2 Killer Projectors for Your Home Theater
from SweetTech https://www.wired.com/2017/04/best-tv-projectors/
Review: Fitbit Alta HR
from SweetTech https://www.wired.com/2017/04/review-fitbit-alta-hr/
Saturday, April 22, 2017
Security News This Week: A Coachella Smartphone Thief Forgot About ‘Find My iPhone’
from SweetTech https://www.wired.com/2017/04/security-news-week-coachella-smartphone-thief-forgot-find-iphone/
Want to Stop Facebook Violence? You Won’t Like the Choices
from SweetTech https://www.wired.com/2017/04/face-law-cant-keep-violence-off-facebook-either/
Friday, April 21, 2017
Encrypted Chat Took Over. Let’s Encrypt Calls, Too
from SweetTech https://www.wired.com/2017/04/encrypted-chat-took-now-encrypted-callings-turn/
The US Charging Julian Assange Could Put Press Freedom on Trial
from SweetTech https://www.wired.com/2017/04/us-charging-julian-assange-put-press-freedom-trial/
A New Way to Securely Send Information to WIRED
from SweetTech https://www.wired.com/2017/04/new-way-securely-send-information-wired/
Use These 5 Top VPNs To Browse The Internet Anonymously

top 5 VPNs to secure your browser
In today’s life, the internet has become quite a necessity. While the internet offers us countless benefits, it also has its drawbacks. The Internet is also used by criminals to target innocent people and take away their information and use it for their own personal gains.
Although there are tons of ways you can prevent cyber criminals to take away your important information, the best way is to stay anonymous over the internet especially if you have tons of important data lying in your computer/device.
Staying anonymous on the internet isn’t hard. All you need is a virtual private network which will hide away your true identity and will make it impossible for the hackers to access your private data.
We have listed down top 5 VPNs that you can trust with a blind eye.
HotSpot Shield Elite Plus
Hotspot shield elite plus makes sure your chances of becoming a victim of internet theft is reduced. Your data is completely encrypted and secured through the private network that Hotspot sets up for you. The best thing about this VPN is that you can use it simultaneously over various devices without paying an extra penny.
VPN Unlimited
VPN unlimited sets itself apart by offering you a very fast server and even faster server switching. You can switch your server with a single click to shade away from your IP address. This VPN is great if you are using it on a mobile device.
Pure VPN
Pure VPN is perhaps the most trusted VPN service out there. Millions of people are using it as you read this post. It is known for offering very high-end encryption that will protect your system effectively from cyber criminals. Plus you can attach up to five devices on it through a single subscription. The VPN supports a host of different devices ranging from mobiles to gaming consoles.
ZenVPN
ZenVPN makes our list of top 5 VPNs because of the number of servers it offers. ZenVPN will give you 34 locations worldwide that you can switch with a single click. They are constantly adding more and more locations as time passes by.
TigerVPN
TigerVPN is the only VPN from this list that offers military-level end to end encryption for your MAC, Windows, iOS or Android. It has fewer servers across the world but has the highest level of security from these VPNs.
The post Use These 5 Top VPNs To Browse The Internet Anonymously appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/use-5-top-vpns-browse-internet-anonymously/
via The Cyber Security Portal
Thursday, April 20, 2017
Fevzi Turkalp from GadgetDetective.com answers 5Live listeners’ technology questions
from SweetTech http://www.bbc.co.uk/programmes/p050nxyz
Sony’s New Mirrorless Camera Is Its Most Beastly Shooter Yet
from SweetTech https://www.wired.com/2017/04/sony-alpha-a9/
A Seemingly Simple Tweak Unlocks Google Home’s Full Potential
from SweetTech https://www.wired.com/2017/04/google-home-multiple-accounts/
Facebook Just Handed Out Thousands of 360 Cameras. We’ve Got a Review
from SweetTech https://www.wired.com/2017/04/giroptic-io-360-camera-review/
In Facebook’s Future, You Live Through Your Phone
from SweetTech https://www.wired.com/2017/04/facebooks-future-live-phone/
Here’s Everything Facebook Announced at F8, From VR to Bots
from SweetTech https://www.wired.com/2017/04/everything-facebook-announced-at-f8/
Facebook Messenger’s Plot to Be the Only App You Ever Need
from SweetTech https://www.wired.com/2017/04/facebook-messengers-plot-app-ever-need/
Samsung Galaxy S8 First Impressions: That Screen, You Guys
from SweetTech https://www.wired.com/2017/04/samsung-galaxy-s8-hands-on/
How to Watch Facebook F8
from SweetTech https://www.wired.com/2017/04/how-to-watch-facebook-f8/
Rhode Island Hires First State Cybersecurity Officer

Rhode island’s first ever state cyber security officer
Rhode Island has just hired its first state Cybersecurity officer. Mike Steinmetz will be serving as Gov. Gina M. Raimondo’s policy advisor on cyber security. He will also help develop a comprehensive state cybersecurity strategy that will help the state fight back cyber crimes and prevent them.
Steinmetz will also be serving as Rhode Island’s homeland security adviser. He began working on April 17.
Raimondo made this decision as a part of continuing efforts to create economic development and increase innovation. The decision was also made based on the series of 8 different recommendations in a report that was released in 2015 from the cybersecurity commission of Rhode Island.
The post Rhode Island Hires First State Cybersecurity Officer appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/rhode-island-hires-first-state-cybersecurity-officer/
via The Cyber Security Portal
Delta Risk has been named in top 25 cyber security companies

Delta risk recognized as the top 25 best cybersecurity companies
Delta Risk is a global provider of risk management and cyber security services. The company announced today that it has been included in the list that recognizes top cyber security companies of 2017. They were selected to be in the top 25 companies by CIO Applications.
CIO Applications judges companies based on the evaluation of their ability to help government and commercial entities in the entire world to build advanced risk management capabilities and cyber defense.
The list of these companies are released every year and is selected by a panel of various experts from the cyber security industry and CIO applications editorial team.
The post Delta Risk has been named in top 25 cyber security companies appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/delta-risk-named-top-25-cyber-security-companies/
via The Cyber Security Portal
Wednesday, April 19, 2017
Is your Content Management System putting you at risk?
from SweetTech http://feedproxy.google.com/~r/TalkTechToMe-All/~3/xN_9MW1LFZM/
North Korea’s Failed Missile Launch Eases Experts’ Worst-Case Scenario Fears
from SweetTech https://www.wired.com/2017/04/north-koreas-failed-rocket-test-eases-experts-worst-case-scenario-fears/
Tuesday, April 18, 2017
Facebook Offers a Better Way to Get Back Into Your Locked-Out Apps
from SweetTech https://www.wired.com/2017/04/facebook-offers-better-way-get-back-locked-apps/
Sneaky Exploit Allows Phishing Attacks From Sites That Look Secure
from SweetTech https://www.wired.com/2017/04/sneaky-exploit-allows-phishing-attacks-sites-look-secure/