The US Congress has proposed an act that would repeal the National Security Agency’s (NSA's) authority to access basic business records and the phone records of American citizens. The bill, Ending Mass Collection of Americans’ Phone Records Act, is intended to “repeal the authority to access on an ongoing basis business records for foreign intelligence and international terrorism investigations, and for other purposes.” Introduced Thursday, the act establishes several...
INFOSECURITY MAGAZINE
READ MORE
|
The European Centre for Cybersecurity in Aviation (ECCSA) has opened its doors to eligible organisations that would like to become members of the knowledge centre and information-sharing network, which was established two years ago to counter the threats to aviation posed by cyber-attacks. Industry-wide cooperation on cyber-security matters is particularly important in the aviation sector as most aviation services can only be offered with the contribution of many stakeholders. The vulnerabilitie...
INTERNATIONAL AIRPORT REVIEW
READ MORE
|
The negative impact of the GDPR on internet domain registration information is raising concern in cyber security circles because the data is key to cyber crime fighting operations. The EU’s General Data Protection Regulation (GDPR) is resulting in internet domain registrars hiding domain registration information to avoid fines for non-compliance. Domain registration information is published by domain registrars in the international Registration Directory Service (RDS), formerly known as Wh...
COMPUTER WEEKLY
READ MORE
|
Cyber-security startup Awake Security announced its flagship technology platform on Nov. 19, providing organizations with a network-based approach for discovering potential cyber-risks. The Awake Security Platform is network traffic analysis (NTA) technology that analyzes data packets to identify malicious and unauthorized activities. The platform’s automated triage capabilities provide risk ratings for security operations center analysis; it can be integrated with third-party endpoint sec...
EWEEK
READ MORE
|
Using a sophisticated combination of malware components, Operation Windigo is a widespread cybercriminal campaign that hijacks servers, infects the devices that visit them and steals users’ information. Interestingly, although Windigo-affected websites attempt to infect visiting Windows computers with malware via an exploit kit, Mac users are typically served advertisements for dating sites, and iPhone owners are redirected to pornographic online content....
INFOSECURITY-MAGAZINE
READ MORE
|
“Educating cybersecurity professionals should be one of the top global priorities,” said Julie Peeler, director of the (ISC)² Foundation, in a statement. "The profound staffing and skills shortages in this industry put organizations' reputations and customer data at risk. We are proud to collaborate with University of Phoenix to offer these scholarships and provide learning and career opportunities to the next generation of information security professionals.”...
INFOSECURITY-MAGAZINE
READ MORE
|