Stopping Hackers in Their Tracks

Federal Bureau of Investigation (FBI) (Image) #FBI Arrests #Hacker Who Stole #Data from Tech Company | #TpromoCom #Espionage #Gov | A nightmare scenario for many organizations recently became one Atlanta-based tech company’s reality. But the steps the company took before and after their sensitive data was stolen by a hacker in 2018 helped the FBI identify and arrest the culprit.

Christian Kight used his computer programming skills to hack into various businesses for money while on parole for previous crimes. Kight downloaded scripts from hacker forums and used them to attack company networks.

In the case of the Atlanta company, Kight spent a few weeks hacking into the company’s network, using various tactics to hide his identity. He then downloaded the data to his own computer and deleted it from the company’s systems.
divider, blue (image)
ISIO logo (image)
#Security Practitioners do recognize #COVID19 as an active biological #health threat. Use specific protocols for technology, equipment and layered manpower. All of which can be found on #ISIO. Be assured of our highest considerations. bit.ly/30OAyoo

 

Human Investigation Management – ISIO
Human Investigation Management – ISIO. Find out more by clicking!

 

Tech Companies, National Security, Trade Secrets, and the Increased Controls on the Export of Emerging Technologies

Matters of National Security (image)

Earlier this year, the President signed into law. H.R. 4998, the Secure and Trusted Communications Networks Act of 2019 (‘the Legislation”), which prohibits certain Federal subsidies from being used to purchase communications equipment or services from Huawei and other providers that are deemed to pose a risk to national security.

To read the remainder of this important article, click here.
Human Investigation Management – ISIO
Human Investigation Management – ISIO. Find out more by clicking!

divider bar (image)

Call TpromoCom for Digital Navigation (image)
We do Social Media, Content, Web Design & Hosting, and more. Call us at 330-956-9003.

Firefox Releases Critical Patch Update to Stop Ongoing Zero-Day Attacks

Firefox Releases Critical Patch Update to Stop Ongoing Zero-Day Attacks | #TpromoCom #Browser #Patch #Hackers | If you use the Firefox web browser, you need to update it right now.
Mozilla earlier today released Firefox 67.0.3 and Firefox ESR 60.7.1 versions to patch a critical zero-day vulnerability in the browsing software that hackers have been found exploiting in the wild.

Discovered and reported by Samuel Groß, a cybersecurity researcher at Google Project Zero, the vulnerability could allow attackers to remotely execute arbitrary code on machines running vulnerable Firefox versions and take full control of them.

Want to know more?

To read the remainder of this news article, click here.

Human Investigation Management – ISIO
Human Investigation Management – ISIO.
Find out more by clicking!

FBI Warns of Dangers in ‘Safe’ Websites

Dark Reading cybersecurity news website

FBI Warns of Dangers in ‘Safe’ Websites | #TpromoCom #FBI #CyberSecurity #Cyber | Criminals are using TLS certificates to convince users that fraudulent sites are worthy of their trust.

One of the most common mechanisms used to secure web browser sessions — and to assure consumers that their transactions are secure — is also being used by criminals looking to gain victims’ trust in phishing campaigns. The FBI has issued a public service announcement defining the problem and urging individuals to go beyond simply trusting any “https” URL.

Browser publishers and website owners have waged successful campaigns to convince consumers to look for lock icons and the “https:” prefix as indicators that a website is encrypted and, therefore, secure. The problem, according to the FBI and security experts, is that many individuals incorrectly assume that an encrypted site is secure from every sort of security issue.

To read the remainder of this news article, click here.

Border & Maritime security to grow two-fold by 2028

#Border & #Maritime #security to grow two-fold by 2028 | #TpromoCom #Trending | Global instability due to terrorism and civil disruptions is leading to increased pressures among border and maritime security agencies to keep their borders safe from human, drugs, and weapons trafficking while streamlining operations to process genuine travellers.

According to Frost & Sullivan’s recent analysis, Global Border and Maritime Security Market, a high impetus on cross-border data sharing and integrated security systems is driving the need for technological solutions that act as force multipliers. Frost & Sullivan forecasts the market to grow two-fold from $19.22 billion in 2018 to reach $35.23 billion in 2028 at 6 percent CAGR.

“The adoption and integration of next-generation systems and technologies powered by artificial intelligence and real-time big data analytics will enable faster and more accurate threat detection, tracking, and decision making,” said Aravind Srimoolanathan, Senior Research Analyst, Security at Frost & Sullivan. “Robust network infrastructure and cyber security capabilities will be required with increasing inter-agency collaboration and cross-border data sharing.”

From a technology standpoint, Srimoolanathan predicts that multimodal biometrics for seamless security processing of travellers, tracking and identification through video analytics, and the concept of smart border management will gain prominence. Security industry consolidation and merger and acquisition activities with start-ups, which provide innovative solutions for the border security market, are also highly likely.

To read the remainder of this news article, click here.

TpromoCom [image]
Need help with a new website, blog, or social media outreach program? Call TpromoCom at 330-956-9003 for help.

A New Consensus Is Emerging On How to Handle The Risk from China’s 5G

A New Consensus Is Emerging On How to Handle The Risk from China’s 5G | #TpromoCom #China #Spy #5G | Chinese telecom tech is invading the physical world, but Europeans and industry have strategies to contain the threat.

“No one calls it an intelligence risk, but national security agencies across the world are concerned about China’s 5G modems and other devices,” says Al Colombo, Senior Design Specialist with TpromoCom of Canton, Ohio.

Much of the Western intelligence debate around Chinese high-speed 5G technology has focused on hardware and software. Once the hardware is already out in the wild — which most think is inevitable — the future of the fight is in managing risk. It’s doable, if not yet widely advertised, according to several experts speaking at a U.S. intelligence conference this week, by quarantining Chinese equipment and deploying smarter electromagnetic spectrum management tools to better handle threats.

Bottom line: Huawei leads the world in the ability to rapidly produce cheap telecom hardware (as well as the underlying software.) Recent reports, including one from NATO, state it plainly. It’s one reason why European countries, including U.S. allies like Germany and the U.K., have been reluctant to ban tech from Huawei outright, even in the face of heavy U.S. pressure.

To read the remainder of this extremely interesting and timely news article, click here.

Google Helps Police Identify Devices Close to Crime Scenes Using Location Data

Google Helps Police Identify Devices Close to Crime Scenes Using Location Data | #TpromoCom #Google #Police #Crime | It’s no secret that Google tracks you everywhere, even when you keep Google’s Location History feature disabled.

As revealed by an Associated Press investigation in 2018, other Google apps like Maps or daily weather update service on Android allows the tech giant to continuously collect your precise latitude and longitude.

According to Google, the company uses this location-tracking features with an intent to improve its users’ experience, like “personalized maps, recommendations based on places you’ve visited, help finding your phone, real-time traffic updates about your commute, and more useful ads.”

Moreover, it’s also known that Google could share your location data with federal authorities in criminal investigations when asked with a warrant.

To read the remainder of this news article, click here.


Subscribe to Security eNews and receive our updates in your mail box! On the right!

Investigator Says Amazon Chief’s Phone Hacked by Saudis

Investigator Says Amazon Chief’s Phone Hacked by Saudis | #TpromoCom #Amazon #Hacker #CyberSecurity | Everyone’s a target sometime when it comes to cybercrime. The art of avoidance where it involves hackers is certainly of great value as we move further into the 21st Century world of digital thuggery and political terrorism.

Here we have a high official with Amazon, Jeff Bezos, who’s cellphone was allegedly hacked by a foreign entity for what could be construed as an effort to uncover the identity of the individual that murdered a Saudi journalist. Bezos owns The Washington Post which investigated the murder.

Photo: by HubSpot

“Bezos hired Gavin de Becker & Associates to find out how his intimate text messages and photos made their way into the hands of the Enquirer, which reported on the Amazon chief’s extramarital affair, leading to his divorce,” says the author of the Security Week story below. The moral of the story is to trust no one, not even your own mobile device. —Al Colombo

The investigator hired to look into the release of intimate images of Jeff Bezos said Saturday he has concluded that Saudi Arabian authorities hacked the Amazon chief’s phone to access his personal data.

Gavin de Becker linked the hack to extensive coverage by The Washington Post newspaper, which is owned by Bezos, of the murder of Saudi journalist Jamal Khashoggi at the kingdom’s consulate in Istanbul last year.

To read the remainder of this news story, click here.

[image] Security professionals in the electronic protection of commercial and residential structures are invited to join other owners and managers in The Security Coaching Forum on Facebook.
Security professionals in the electronic protection of commercial and residential structures are invited to buy and sell their surplus equipment on Facebook. Click on the banner above .