Firefox Releases Critical Patch Update to Stop Ongoing Zero-Day Attacks

Firefox Releases Critical Patch Update to Stop Ongoing Zero-Day Attacks | #TpromoCom #Browser #Patch #Hackers | If you use the Firefox web browser, you need to update it right now.
Mozilla earlier today released Firefox 67.0.3 and Firefox ESR 60.7.1 versions to patch a critical zero-day vulnerability in the browsing software that hackers have been found exploiting in the wild.

Discovered and reported by Samuel Groß, a cybersecurity researcher at Google Project Zero, the vulnerability could allow attackers to remotely execute arbitrary code on machines running vulnerable Firefox versions and take full control of them.

Want to know more?

To read the remainder of this news article, click here.

Human Investigation Management – ISIO
Human Investigation Management – ISIO.
Find out more by clicking!
Please follow and like us:
error

FBI Warns of Dangers in ‘Safe’ Websites

Dark Reading cybersecurity news website

FBI Warns of Dangers in ‘Safe’ Websites | #TpromoCom #FBI #CyberSecurity #Cyber | Criminals are using TLS certificates to convince users that fraudulent sites are worthy of their trust.

One of the most common mechanisms used to secure web browser sessions — and to assure consumers that their transactions are secure — is also being used by criminals looking to gain victims’ trust in phishing campaigns. The FBI has issued a public service announcement defining the problem and urging individuals to go beyond simply trusting any “https” URL.

Browser publishers and website owners have waged successful campaigns to convince consumers to look for lock icons and the “https:” prefix as indicators that a website is encrypted and, therefore, secure. The problem, according to the FBI and security experts, is that many individuals incorrectly assume that an encrypted site is secure from every sort of security issue.

To read the remainder of this news article, click here.

Please follow and like us:
error

Border & Maritime security to grow two-fold by 2028

#Border & #Maritime #security to grow two-fold by 2028 | #TpromoCom #Trending | Global instability due to terrorism and civil disruptions is leading to increased pressures among border and maritime security agencies to keep their borders safe from human, drugs, and weapons trafficking while streamlining operations to process genuine travellers.

According to Frost & Sullivan’s recent analysis, Global Border and Maritime Security Market, a high impetus on cross-border data sharing and integrated security systems is driving the need for technological solutions that act as force multipliers. Frost & Sullivan forecasts the market to grow two-fold from $19.22 billion in 2018 to reach $35.23 billion in 2028 at 6 percent CAGR.

“The adoption and integration of next-generation systems and technologies powered by artificial intelligence and real-time big data analytics will enable faster and more accurate threat detection, tracking, and decision making,” said Aravind Srimoolanathan, Senior Research Analyst, Security at Frost & Sullivan. “Robust network infrastructure and cyber security capabilities will be required with increasing inter-agency collaboration and cross-border data sharing.”

From a technology standpoint, Srimoolanathan predicts that multimodal biometrics for seamless security processing of travellers, tracking and identification through video analytics, and the concept of smart border management will gain prominence. Security industry consolidation and merger and acquisition activities with start-ups, which provide innovative solutions for the border security market, are also highly likely.

To read the remainder of this news article, click here.

TpromoCom [image]
Need help with a new website, blog, or social media outreach program? Call TpromoCom at 330-956-9003 for help.
Please follow and like us:
error

A New Consensus Is Emerging On How to Handle The Risk from China’s 5G

A New Consensus Is Emerging On How to Handle The Risk from China’s 5G | #TpromoCom #China #Spy #5G | Chinese telecom tech is invading the physical world, but Europeans and industry have strategies to contain the threat.

“No one calls it an intelligence risk, but national security agencies across the world are concerned about China’s 5G modems and other devices,” says Al Colombo, Senior Design Specialist with TpromoCom of Canton, Ohio.

Much of the Western intelligence debate around Chinese high-speed 5G technology has focused on hardware and software. Once the hardware is already out in the wild — which most think is inevitable — the future of the fight is in managing risk. It’s doable, if not yet widely advertised, according to several experts speaking at a U.S. intelligence conference this week, by quarantining Chinese equipment and deploying smarter electromagnetic spectrum management tools to better handle threats.

Bottom line: Huawei leads the world in the ability to rapidly produce cheap telecom hardware (as well as the underlying software.) Recent reports, including one from NATO, state it plainly. It’s one reason why European countries, including U.S. allies like Germany and the U.K., have been reluctant to ban tech from Huawei outright, even in the face of heavy U.S. pressure.

To read the remainder of this extremely interesting and timely news article, click here.

Please follow and like us:
error

Google Helps Police Identify Devices Close to Crime Scenes Using Location Data

Google Helps Police Identify Devices Close to Crime Scenes Using Location Data | #TpromoCom #Google #Police #Crime | It’s no secret that Google tracks you everywhere, even when you keep Google’s Location History feature disabled.

As revealed by an Associated Press investigation in 2018, other Google apps like Maps or daily weather update service on Android allows the tech giant to continuously collect your precise latitude and longitude.

According to Google, the company uses this location-tracking features with an intent to improve its users’ experience, like “personalized maps, recommendations based on places you’ve visited, help finding your phone, real-time traffic updates about your commute, and more useful ads.”

Moreover, it’s also known that Google could share your location data with federal authorities in criminal investigations when asked with a warrant.

To read the remainder of this news article, click here.


Subscribe to Security eNews and receive our updates in your mail box! On the right!

Please follow and like us:
error

Investigator Says Amazon Chief’s Phone Hacked by Saudis

Investigator Says Amazon Chief’s Phone Hacked by Saudis | #TpromoCom #Amazon #Hacker #CyberSecurity | Everyone’s a target sometime when it comes to cybercrime. The art of avoidance where it involves hackers is certainly of great value as we move further into the 21st Century world of digital thuggery and political terrorism.

Here we have a high official with Amazon, Jeff Bezos, who’s cellphone was allegedly hacked by a foreign entity for what could be construed as an effort to uncover the identity of the individual that murdered a Saudi journalist. Bezos owns The Washington Post which investigated the murder.

Photo: by HubSpot

“Bezos hired Gavin de Becker & Associates to find out how his intimate text messages and photos made their way into the hands of the Enquirer, which reported on the Amazon chief’s extramarital affair, leading to his divorce,” says the author of the Security Week story below. The moral of the story is to trust no one, not even your own mobile device. —Al Colombo

The investigator hired to look into the release of intimate images of Jeff Bezos said Saturday he has concluded that Saudi Arabian authorities hacked the Amazon chief’s phone to access his personal data.

Gavin de Becker linked the hack to extensive coverage by The Washington Post newspaper, which is owned by Bezos, of the murder of Saudi journalist Jamal Khashoggi at the kingdom’s consulate in Istanbul last year.

To read the remainder of this news story, click here.

[image] Security professionals in the electronic protection of commercial and residential structures are invited to join other owners and managers in The Security Coaching Forum on Facebook.
Security professionals in the electronic protection of commercial and residential structures are invited to buy and sell their surplus equipment on Facebook. Click on the banner above .

Please follow and like us:
error

Ex-NSA Contractor Pleads Guilty to 20-Year-Long Theft of Classified Data

Ex-NSA Contractor Pleads Guilty to 20-Year-Long Theft of Classified Data | #TpromoCom #NSA #Government #Guilty | The theft was labeled as the largest heist of classified government material in America’s history.

Harold Thomas Martin III, a 54-year-old Navy veteran from Glen Burnie, abused his top-secret security clearances to stole at least 50 terabytes of classified national defense data from government computers over two decades while working for a number of NSA departments between 1996 and 2016.

In August 2016, the FBI arrested Martin at his Maryland home and found “six full bankers’ boxes” worth of documents, many of which were marked “Secret” and “Top Secret,” in his home and car.

To read the remainder of this news article, click here.

[image] TpromoCom is a social media and web content company. Call or email us at tpromo@mail.com.
TpromoCom is a social media and web content company.
Call 330-956-9003 or email us at tpromo@mail.com.
Please follow and like us:
error

Chinese Hackers Target 27 Universities to Acquire Military Technology


Chinese Hackers Target 27 Universities to Acquire Military Technology | #TpromoCom #China #Hacker #Hackers | Over two dozen universities in the U.S. and around the world have been singled out for access to maritime military research. (please scroll for more)

Dozens of universities have fallen victim to a cyberattack conducted by Chinese hackers attempting to steal information on military technology.

The University of Washington, the University of Hawaii and the Massachusetts Institute of Technology (MIT) are among at least 27 universities that have been targeted, reports ZD Net.

To read the remainder of this news article, click here.

[divider (image)]
Security company owners, operations managers, and sales managers are invited to join The Coaching Forum on Facebook!
Please follow and like us:
error