security threats

The Top 3 Cloud Network Security Threats (And How to Avoid Them)

As more businesses move to the cloud, they are becoming increasingly vulnerable to cloud network security threats. Here are the top three threats and how to avoid them: Data breaches One of the most common and devastating cloud security threats is data breaches. These can occur when hackers gain access to a company’s cloud-based data, …

The Top 3 Cloud Network Security Threats (And How to Avoid Them) Read More »





security threats

Looking at the top security threats for MSPs in the first half of 2024

Steve Brining of Acronis joins us on the podcast to discuss the finding of its semi-annual study of the attacks that MSPs are facing off against in the battle to protect themsleves and their customers.




security threats

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 - Nov 03)

This week was a total digital dumpster fire! Hackers were like, "Let's cause some chaos!" and went after everything from our browsers to those fancy cameras that zoom and spin. (You know, the ones they use in spy movies? ????️‍♀️) We're talking password-stealing bots, sneaky extensions that spy on you, and even cloud-hacking ninjas! ???? It's enough to make you want to chuck your phone in the ocean.




security threats

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10)

⚠️ Imagine this: the very tools you trust to protect you online—your two-factor authentication, your car’s tech system, even your security software—turned into silent allies for hackers. Sounds like a scene from a thriller, right? Yet, in 2024, this isn’t fiction; it’s the new cyber reality. Today’s attackers have become so sophisticated that they’re using our trusted tools as secret pathways,




security threats

Somaliland Says Ready for Peaceful Elections, Calls for International Support Against Security Threats

[Addis Standard] Addis Abeba -- The Ministry of Foreign Affairs and International Cooperation of Somaliland has announced progress in preparing for the upcoming presidential and party elections scheduled to take place on 13 November this year.




security threats

Cybersecurity Threats are in Plain Sight, Yet are Largely Unnoticed

The physical devices that block vulnerable USB ports and data connectors – such as the ones offered by The Connectivity Center – represent and easy and obvious preventative element of network security solutions, but ate often unused.




security threats

The Connectivity Center Offers Added Protection Against Cybersecurity Threats

The Connectivity Center provides cyber defense, protection, and security information through its Smart Keeper series of products that block physical access to your computers and networks.




security threats

School children's data exposed to cyber security threats due to education department oversight

The records of children and teachers have been left vulnerable to cyber security attacks due to an oversight from the Northern Territory Government, a report from the auditor general's Office has revealed.




security threats

Network Detective helps organisations secure work-at-home devices to mitigate cybersecurity threats and vulnerabilities caused by remote workforces

What was once considered a luxury – the ability to work from home – is now a necessity in today’s unprecedented time.




security threats

Is a U.S. Immigration System Rebuilt after 9/11 Prepared to Tackle Ever-Evolving Security Threats, Including Pandemics? Report Assesses Successes, Gaps

WASHINGTON — The U.S. immigration system was dramatically reshaped by the terrorist attacks of September 11, 2001, which shone a harsh spotlight on weaknesses in visa and immigration screening processes. From the creation of the Department of Homeland Security (DHS) to expanded national security protections in immigration and tourism policies, countless changes in the immigration arena have unfolded over the past 19 years.




security threats

When National Security Threats Influence Education Policy and Politics

A new research study, released just a few days before the U.S. military killed a top Iranian military commander and escalated international tensions, looked at connections between sudden national security crises and education policymaking in Washington.




security threats

The Future of Security Threats: New Risks, and an Old Threat Resurfaces

Computer and network security is an ever-evolving field. As technology advances, cybercriminals find new ways to exploit vulnerabilities in order to get at your personal, financial, or organizational data. We recently spoke with Symantec's Director of Security Response Kevin Haley to get an idea of what threats you'll face in the next year or two.

In short, expect a continuation of common threats like ransomware, as well as the emergence of new threats from connected devices and the so-called Internet of Things. Plus, keep an eye out for the resurgence of an old threat made new.

Ransomware with a Twist

Ransomware — malicious software that locks your data or otherwise compromises your computer in an attempt to extort money — is not a new threat. It's been around for a number of years in various forms. But according to Haley, a new form of ransomware doesn't just lock your files; instead, it threatens to publicly release your data unless you pay up.

For many individuals, this may simply mean an embarrassing leakage of personal data — browser history, emails, photos, and so on. For a nonprofit, especially one that deals with sensitive sociopolitical issues, the possibility of data leakage can have more serious ramifications. It could pose a threat to the community you serve.

Email That Looks Like It Came from a Co-worker

In traditional phishing attempts, scammers create an email that appears to be from a legitimate source — say, Google, Amazon, or Apple. Then they attempt to steal account information, such as usernames and passwords. But in an emerging form of phishing, hackers may use emails purportedly from co-workers or business associates to try to steal information from your organization.

For example, Haley says, you may receive an email from a vendor or a colleague asking for specific pieces of information (such as tax forms) or for money outright. The only problem is that these emails originate from scammers, not your colleagues. And once you email an important piece of information to these impersonators, there's no way to get it back.

With proper data handling, though, you can avoid these sorts of nightmares. See our recent post, 5 Data Security Risks for Nonprofits (and How to Fix Them), to learn more.

The Internet of Things Can Make People Vulnerable

From smart locks to Internet-connected appliances, the Internet of Things promises to change the way we interact with all sorts of items within our homes and offices. But with this comes the potential for security headaches.

According to Haley, these "smart" devices are rarely protected properly, and are easy to infect with malware. And this isn't just an issue that may cause problems some years down the line. Last year, as CNET reported, a network of malware-infected DVRs and webcams overloaded a number of popular websites and online services, temporarily knocking them offline.

Word Macro Viruses Make a Comeback

Perhaps the most surprising threat Haley warned about was the revival of Word macro viruses.

Macro viruses use Microsoft Word's macro programming feature — typically used to automate certain tasks within Word — to infect your computer. Macro viruses have been around for many, many years. And Word disables macros by default: If you open a Word document with a macro, you'll have to click a button to tell Word to turn on any macros within that document.

With this new wave of macro viruses, however, criminals employ social engineering trickery to goad you into turning on macros, allowing the macro virus to do its thing.

Fortunately, you can easily protect yourself from getting infected. First, don't open file attachments from people you don't know. If you receive a Word document with macros from someone you do know, confirm with that person to make sure that they intended to send the macros and that they are safe to run.

As Always, Vigilance Is Key

Although specific threats may evolve over time, good security practices never go out of style. Use a security software package and keep it updated. Enforce good account security practices within your organization.

Don't open file attachments from people you don't know, and don't open unexpected file downloads. Secure all your devices as best you can. And if something seems fishy — perhaps that email from your boss doesn't seem quite right — don't be afraid to question it.

By taking small steps like these, you might save yourself — and your organization — some serious pain.




security threats

Remarks by Assistant Attorney General John P. Carlin on Cyber National Security Threats at Carnegie Mellon University

This week marks a busy time for national security law. There is a lot going on in the world, all of which we are tracking closely. But I’m going to focus today on the threats associated with national security cyber issues.




security threats

Confronting national security threats in the technology age


Event Information

March 11, 2015
1:30 PM - 3:00 PM EDT

Saul/Zilkha Rooms
Brookings Institution
1775 Massachusetts Avenue NW
Washington, DC 20036

Register for the Event

Cutting-edge technology has led to medical breakthroughs, the information age, and space exploration, among many other innovations. The growing ubiquity of advanced technology, however, means that almost anyone can harness its power to threaten national, international, and individual security. In their new book, The Future of Violence: Robots and Germs, Hackers and Drones—Confronting a New Age of Threat (Basic Books, 2015), Benjamin Wittes and Gabriella Blum explore the potential dangers of modern technology when acquired by hostile groups or individuals.

On March 11, Governance Studies at Brookings hosted a book event to discuss the new threats to national security and the developing framework for confronting the technology-enabled threats of the 21st century. In order to manage the challenges and risks associated with advanced technology, governments, organizations, and citizens must reconsider the intersection of security, privacy, and liberty. What does this mean for domestic and international surveillance? How will the government protect its citizens in an age of technology proliferation?

After the program, panelists will take audience questions.

Audio

Transcript

Event Materials

     
 
 




security threats

The European Union: facing the challenge of multiple security threats / edited by Antonina Bakardjieva Engelbrekt, Anna Michalski, Niklas Nilsson, Lars Oxelheim

Dewey Library - JZ5588.E88 2018