menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Mettisglobal

4w

read

125

img
dot

Image Credit: Mettisglobal

Shaza Fatima stresses protection for children against online threats

  • Minister of State for IT and Telecommunication, Shaza Fatima Khawaja, emphasizes the urgent need for collective efforts to tackle online safety challenges
  • Children are particularly vulnerable to online dangers, and joint efforts are crucial to counter these threats
  • The meeting with Miranda Sissons, Global Human Rights Policy Lead for Meta, focused on digital safety and the growing risks associated with online threats
  • Shaza Fatima highlights the government's commitment to strengthening cybersecurity and ensuring the availability of quality content on social media platforms

Read Full Article

like

7 Likes

source image

The Fintech Times

4w

read

44

img
dot

Good People Use Social Media: Social Media Firms and Banks Have a Responsibility to Protect Them

  • Only one in five UK adults believe social media platforms are doing enough to tackle payment scams, according to a survey by Tunic Pay and Opinium.
  • 69% of respondents believe social media firms have the power to do more to prevent scams, with 51% holding banks and social media platforms equally responsible for failing to prevent scams.
  • 66% of respondents believe banks should work harder to check payment recipients before transactions go through.
  • Over £150 million were lost to authorised push payment (APP) scams in the UK in the first half of this year, causing concerns about using social media platforms.

Read Full Article

like

2 Likes

source image

TechJuice

4w

read

295

img
dot

Image Credit: TechJuice

PTA and NCERT Sign MoU to Strengthen Cybersecurity Resilience

  • The Pakistan Telecommunications Authority (PTA) and the National Computer Emergency Response Team (NCERT) have signed a Memorandum of Understanding (MoU) to enhance cooperation in cybersecurity and safeguard Pakistan’s digital infrastructure.
  • The agreement aims to improve cybersecurity and ensure the safety and reliability of Pakistan’s digital ecosystem.
  • The Chairman of PTA emphasized the need for collaboration in addressing cyber threats and protecting national IT infrastructure.
  • This partnership will strengthen Pakistan’s cybersecurity capabilities and foster a secure digital environment for all stakeholders.

Read Full Article

like

17 Likes

source image

Global Fintech Series

4w

read

71

img
dot

Image Credit: Global Fintech Series

Equifax and Mastercard Join Forces to Combat Payment Fraud in Latin America

  • Equifax and Mastercard have partnered to combat payment fraud in Latin America.
  • Mastercard is offering fraud prevention and chargeback mitigation solutions to financial institutions, payment service providers, acquiring banks, and merchants.
  • The combined solutions, including Mastercard Identity and Ethoca Alerts, aim to protect the digital payments environment and prevent chargebacks.
  • Latin America has high fraud rates, and the collaboration between Equifax and Mastercard aims to improve payment transactions and reduce chargebacks in the region.

Read Full Article

like

4 Likes

source image

Medium

4w

read

89

img
dot

Image Credit: Medium

From Chaos to Control: Why PassVult is the Ultimate Password Manager for Privacy Enthusiasts

  • PassVult is a privacy-focused password manager designed to keep personal information secure.
  • PassVult offers features like TravelMode, MFA, and 2FA for added security.
  • Secure password management is essential to protect against cybersecurity threats.
  • PassVult helps avoid common mistakes like password reuse and weak passwords.

Read Full Article

like

5 Likes

source image

Cybersecurity-Insiders

4w

read

157

img
dot

Image Credit: Cybersecurity-Insiders

China bans use of Intel, AMD and Nvidia Processor Chips for security concerns

  • China has implemented a ban on purchasing and using Intel, AMD, and Nvidia processing chips in products made by its SMBs.
  • This ban is seen as a response to the United States' restrictions on Chinese technology and products.
  • China recommends SMBs to turn to homegrown technology to address security concerns and reduce manufacturing costs.
  • The ban may not significantly impact the global supply chain due to other Asian markets and China's focus on self-reliance.

Read Full Article

like

9 Likes

source image

Securityaffairs

1M

read

196

img
dot

Image Credit: Securityaffairs

Hundred of CISCO switches impacted by bootloader flaw

  • A bootloader vulnerability in Cisco NX-OS affects 100+ switches, allowing attackers to bypass image signature checks.
  • Cisco released security patches for a vulnerability, tracked as CVE-2024-20397, in the NX-OS software’s bootloader.
  • The vulnerability allows an attacker with physical access or administrative credentials to bypass image signature verification.
  • The affected Cisco products running NX-OS Software with a vulnerable BIOS version are listed in the report.

Read Full Article

like

11 Likes

source image

Pymnts

1M

read

398

img
dot

Image Credit: Pymnts

Equifax and Mastercard Partner on Fraud Management in Latin America

  • Equifax and Mastercard have partnered to provide fraud management tools to businesses in Latin America.
  • The collaboration will make these tools available to Mastercard business customers in Latin America through Equifax’s Kount Payment Fraud solution.
  • The tools include Mastercard Identity, Ethoca Alerts, and Ethoca Consumer Clarity, which provide identity verification, fraud risk assessment, order validation, and alerting services.
  • The collaboration aims to enhance security in the payments ecosystem and improve consumers' digital experience in Latin America.

Read Full Article

like

23 Likes

source image

Siliconangle

1M

read

120

img
dot

Image Credit: Siliconangle

Rubrik shares soar 18% on strong third quarter results and upbeat outlook

  • Rubrik shares surged over 18% after the company reported strong third-quarter results.
  • Rubrik's adjusted net loss per share improved significantly to 21 cents compared to $1.39 per share in the same period last year.
  • The company's revenue of $236.2 million was up 44% YoY, beating analysts' expectations.
  • Rubrik's upbeat outlook for its fourth quarter and full year also contributed to the positive investor sentiment.

Read Full Article

like

7 Likes

source image

Dev

1M

read

156

img
dot

Image Credit: Dev

Understanding Active Port Scanning, Firewalls, and Zero Trust Security

  • Active port scanning is a technique used to identify open ports and services on a host or network.
  • Firewalls act as gatekeepers, allowing or denying traffic based on predefined rules.
  • The Zero Trust Security Model treats every user, device, and connection as untrusted by default, enforcing strict authentication and authorization.
  • Combining active port scanning, robust firewalls, and the Zero Trust Security Model can significantly strengthen network security.

Read Full Article

like

9 Likes

source image

Dataprivacyandsecurityinsider

1M

read

344

img
dot

Image Credit: Dataprivacyandsecurityinsider

Telecoms Still Trying to Evict Salt Typhoon

  • The hacking group Salt Typhoon, backed by the People’s Republic of China (PRC), continues to infiltrate telecom providers despite efforts to evict them.
  • The cyber attack was conducted through various methods, making it challenging to fully mitigate and remove the hackers.
  • The incident involved a broad and significant cyber espionage campaign targeting major global telecommunications providers.
  • Authorities have issued a bulletin with best practices to strengthen network security and defend against similar attacks.

Read Full Article

like

20 Likes

source image

Dataprivacyandsecurityinsider

1M

read

31

img
dot

Image Credit: Dataprivacyandsecurityinsider

Public Urged to Use Encryption for Mobile Phone Messaging and Calls

  • Four of the Five Eyes intelligence-sharing group urge the public to use encryption for mobile phone messaging and calls.
  • The joint guide by intelligence and cybersecurity agencies recommends adopting best practices to strengthen network devices against exploitation by hackers, including those affiliated with the People’s Republic of China.
  • The guide highlights the importance of fully end-to-end encrypted messaging and calls to protect the content from interception.
  • The FBI and CISA are investigating PRC-affiliated hacks on telecommunications networks and encourage adoption of the guide's practices.

Read Full Article

like

1 Like

source image

Dev

1M

read

429

img
dot

How to Design Robust AI Systems Against Prompt Injection Attacks

  • Prompt injection is an attack where someone manipulates an AI system designed to follow instructions (or prompts).
  • An attacker can make the system ignore the original instructions, generate incorrect responses, or compromise system security.
  • Prompt injection can affect any application using generative AI, such as chatbots, productivity tools, and coding assistants.
  • To protect against prompt injection, implement external validations, separate operational context from user context, and monitor and log manipulation attempts.

Read Full Article

like

25 Likes

source image

Siliconangle

1M

read

125

img
dot

Image Credit: Siliconangle

Cribl taps into Amazon S3 to power smarter operations and sharper threat intelligence

  • Cribl Inc. is leveraging Amazon S3 to transform it into an operational powerhouse for managing machine-generated data.
  • Cribl aids in SIEM migration by using Amazon S3, allowing organizations to keep pace with the dynamic cybersecurity landscape.
  • Cribl enables faster and efficient investigations in cybersecurity by transforming raw data into actionable threat intelligence.
  • Collaboration and incident response plans are crucial to address emerging threats like deepfakes and phishing attacks.

Read Full Article

like

7 Likes

source image

BGR

1M

read

161

img
dot

Image Credit: BGR

5 encrypted apps you should use while US telcos are under attack

  • US telcos, including AT&T, Verizon, and Lumen, have been targeted by spying attacks believed to be orchestrated by China.
  • Law enforcement advises using encrypted apps to secure messages and calls.
  • Using unencrypted apps like regular SMS puts communications at risk of interception.
  • End-to-end encrypted apps offer strong security against hackers.

Read Full Article

like

9 Likes

For uninterrupted reading, download the app