7 Accounts You Must Always Protect With Two-Factor Authentication

Two-factor authentication adds an extra layer of security and keeps your account protected even if your password is compromised. While it’s advisable to enable two-factor authentication on all accounts that support it, here are some accounts that should always have this extra layer of protection.

The US Wants to Integrate the Commercial Space Industry With Its Military to Prevent Cyber Attacks | WIRED

As space becomes more important to the world’s critical infrastructure, the risk increases that hostile nation-states will deploy cyberattacks on important satellites and other space infrastructure. Targets would include not just spy satellites or military communications satellites, but commercial spacecraft too.

The FIA has been hacked after workers fell for a phishing attack | TechRadar

In a short press release, the FIA confirmed recent phishing attacks resulted in “unauthorized access to personal data contained in two email accounts belonging to the FIA.”

Reduce security risk with 3 edge-securing steps | CSO Online

Risk is everywhere these days, with attacks seemly coming at our businesses from all angles — ransomware, phishing, social engineering, and an ever-growing host of vulnerabilities that can be exploited.

Criminals are using surveillance cameras to stake out homes.

Multiple reports from neighborhoods across Southern California have come in of folks finding cheap cameras with small battery packs lovingly packaged in camouflage tape and pointed at their homes.

Ransomware attacks targeting hospitals, putting lives at risk

Cyberattacks have played havoc with the bottom lines of companies all over the world. They’re also starting to kill people.

11 Must-Do Security Steps Before Heading Out on Your Next Vacation – CNET

Your vacation is coming up, and you already have a hundred things to do. Good news — today’s smart devices and home security make it easier than ever to prep your home for a trip and check on it while you’re away. Video doorbells can watch for packages, home security cameras can send alerts about human figures, even smart lights can help out, all without relying on neighbors you may not know well.

Disgruntled ex-employee costs company over $600,000 after he deletes all 180 of its test servers — found server deletion scripts on Google | Tom’s Hardware

Although Nagaraju was no longer connected with NCS, he discovered that his credentials remained valid, giving him remote access to the company’s servers.

Preparing for a career in cybersecurity? Check out these statistics – Help Net Security

Despite 60% of organizations reporting significant senior leadership support for zero trust, a lack of skills and budget are still cited as the biggest roadblocks to implementing these frameworks, highlighting a discrepancy between support and resource allocation.

Hackers Using OTP bots To Bypass Two-Factor Authentication

After acquiring victim credentials, the scammer sets up a call by selecting an impersonation category (bank, email service, etc.) and manually entering the specific organization name, victim’s name, and phone number.