The Hotel Hijackers White Paper | #TpromoCom #Hotel #Hacker #CyberSecurity | From booking a room to the payments made at shops and restaurants, hotel chains have complex networks that save enormous amounts of sensitive and private data, just waiting to be compromised.
This makes the hospitality industry one of the main targets for cybercriminal activity.
Download our whitepaper, The Hotel Hijackers, to understand:
Why hotel networks became a target of cybercriminals,
THESE ROBOT-PROOF SKILLS GIVE WOMEN AN EDGE IN THE ARTIFICIAL INTELLIGENCE ERA | #ESC_LLC #ArtificialIntelligence #AI #WorkPlace | The latest panic about artificial intelligence is that it will deal a blow to women in the workplace. Women accustomed to gloomy headlines may have met this one with a fatalistic shrug. But it is worth interrogating why on earth it might be true.
The concerns are legitimate enough, but they fail to appreciate the big ways in which the world of work is going to change. In fact, it is quite possible the age of AI will belong to women. Men are the ones in danger of being left behind.
There are admittedly some reasons to worry about women. Some AI tools may be biased against them — a risk for any group that has been historically underrepresented in the workplace. Because machine learning tends to learn from historical data, it can perpetuate patterns from the past into the future. Amazon reportedly discovered a few years ago that an experimental recruitment tool, based on 10 years’ worth of job application data, had taught itself to penalize CVs that contained the word “women’s,” such as “captain of the women’s hockey team.”
To read the remainder of this news article, click here.
Ohio Senate Bill 220 Incentivizes Businesses to Maintain Higher Levels of Cybersecurity | #ESC_LLC #CyberSecurity #Government #Regulation | In the last two years alone, there has been a number of high-profile breaches that have given organizations pause, asking them to consider whether the same kind of event could happen to them. After all, a cybersecurity breach could seriously damage or even level your business if you’re not prepared and do not have the appropriate security programs in place. We’ve seen the implementation of the NYDFS Cybersecurity Regulation, and recent breaches have led to serious fines, potentially in the billions, for violating GDPR.
To read this news article on ESC’s website, click here.
Hacker who reported flaw in Hungarian Telekom faces up to 8-years in prison | #TpromoCom #Ethics #Hacker #Legal | Last year, Hungarian police arrested a 20-year-old ethical hacker accused of finding and exploiting serious vulnerabilities in Magyar Telekom, the largest Hungarian telecommunication company, who is now facing up to 8 years in prison.
The short of it is this, the hacker met with the telcom prior to the second hack, and he was asked or told then to stand down and stop probing their Internet-based servers. The young “ethical hacker” proceeded to penetrate their firewall again and was reported to police who charged him with a cyber crime. The question here is, did he do something wrong?
Before answering the question, read the entire news story (click here) and then perhaps we can talk. I’m going to open this up for anyone who wants to debate the issue. You will see 1) the usual comment window below (you must click on the title of this news piece in order to see it), or 2) you can send me an email at email@example.com. —Al Colombo
The Medical App That Could Mean Life or Death | #TpromoCom #Smartphone #Health #Medical | In the September 2018 issue of Readers Digest there’s a short, one-page story entitled, “This Smartphone Feature Could Save Your Life,” written by Juliana Labianca.
It was so good, that I decided to download the app myself as suggested. The reason why you need to consider this is that if your cell has a pass code, and if you’re in the middle of a heart attack, paramedics might like to know something about your health situation. Your smartphone could provide them with that info, saving them much critical time, thus saving your life.
According to Labianca, some smartphones have a feature that allows someone to type in “Emergency” in order to gain access to your medical diagnosis, historical data, medicines, etc. If you have an android, you may already have a Medical ID application. Look for it in your app library. If you have an i Phone, she says you may already have a “Health App” in your phone.
For those who do not appear to have a Medical ID app, there’s a free Health app, according to Labianca, that you can download–for free. She says it’s called, “Medical ID” and you can recognize it by way of a “bright red star on a white background.”
I installed it on my phone in no time and it was easy to find. Hope no one ever has to use it. Give it a whirl, for your health sake. —Al Colombo
4 Those with out a SmartPhone
LifeStation Mobile GPS Medical Alert – Medical Alert System for Seniors On-The-Go. Nationwide GPS and WiFi Coverage.
INCLUDES 3 MONTHS OF SERVICE AND FREE ACTIVATION: Activation of service required prior to use – call to activate. Service plans start at only $24.95 per month after your first 2 months.
How Hackers Could Hit Super Bowl LIII | #TpromoCom #Hackers #CyberSecurity #Sports | Security threats and concerns abound for the year’s biggest football game. What officials and fans can do about it. Super Bowl LIII will draw the attention of millions of people around the world – and cybercriminals hoping to exploit attendees and fans before and during the big game.
Major sporting events are hot targets for cyberattacks. Consider the 2018 Winter Olympics, when attackers impersonated a North Korean nation-state group to target the Games and more than 300 associated organizations were hit with a phishing attack. Or the World Cup, when the Wallchart phishing campaign delivered malware under the guise of a game-related email.
The massive audience captivated by major sports games, concerts, political events, and similar large-scale gatherings gives attackers a perfect opportunity to strike. If they’re looking to launch a phishing campaign, they have a wealth of potential targets who will click links related to the event. If they want to cause disruption, millions of eyes will be watching when they do.
To read the remainder of this stunning news article, click here.
The Principles of Cybersecurity And Hacking: 5 Books In 1- Cybersecurity and Hacking Series Kindle Edition. Get it now!
Amazon-owned Ring has reportedly been spying on customer camera feeds | #TpromoCom #Camera #VideoSurveillance #Privacy | If you own a Ring doorbell camera system, we’ve got some bad news. The smart home company owned by Amazon, which the Internet retail giant shelled out more than $1 billion to acquire, has apparently been violating its customers’ privacy in a pretty shocking way.
A new report from The Intercept quotes unnamed sources who confirm that engineers and executives at Ring have “highly privileged access” to live customer camera feeds, utilizing both Ring’s doorbells as well as its in-home cameras.
“When security integrators and alarm dealers provide video surveillance at on the exterior of a home, we assume that the manufacturer of the system is as ethical and moralistic as the mission for which it’s installed. To discover that the exterior camera system that we’re using provides unbridled access to inside cameras to company executives and others is something that we would never expect to hear,” says Al Colombo, a well known author in the security industry.
“There are some security professionals who will ignore this news. They will continue to use these products that knowingly call personal security in question. If you’re selling this product, please do the right thing and dig into the issue further to verify 1) that the allegation is true, and 2) how you can mitigate the risk for existing clients as well as new ones.”
To read the remainder of this interesting news story, click here.