Two-factor authentication adds an extra layer of security and keeps your account protected even if your password is compromised. While it’s advisable to enable two-factor authentication on all accounts that support it, here are some accounts that should always have this extra layer of protection.
Category: Security
The US Wants to Integrate the Commercial Space Industry With Its Military to Prevent Cyber Attacks | WIRED
As space becomes more important to the world’s critical infrastructure, the risk increases that hostile nation-states will deploy cyberattacks on important satellites and other space infrastructure. Targets would include not just spy satellites or military communications satellites, but commercial spacecraft too.
The FIA has been hacked after workers fell for a phishing attack | TechRadar
In a short press release, the FIA confirmed recent phishing attacks resulted in “unauthorized access to personal data contained in two email accounts belonging to the FIA.”
Criminals are using surveillance cameras to stake out homes.
Multiple reports from neighborhoods across Southern California have come in of folks finding cheap cameras with small battery packs lovingly packaged in camouflage tape and pointed at their homes.
Ransomware attacks targeting hospitals, putting lives at risk
Cyberattacks have played havoc with the bottom lines of companies all over the world. They’re also starting to kill people.
11 Must-Do Security Steps Before Heading Out on Your Next Vacation – CNET
Your vacation is coming up, and you already have a hundred things to do. Good news — today’s smart devices and home security make it easier than ever to prep your home for a trip and check on it while you’re away. Video doorbells can watch for packages, home security cameras can send alerts about human figures, even smart lights can help out, all without relying on neighbors you may not know well.
Disgruntled ex-employee costs company over $600,000 after he deletes all 180 of its test servers — found server deletion scripts on Google | Tom’s Hardware
Although Nagaraju was no longer connected with NCS, he discovered that his credentials remained valid, giving him remote access to the company’s servers.
Preparing for a career in cybersecurity? Check out these statistics – Help Net Security
Despite 60% of organizations reporting significant senior leadership support for zero trust, a lack of skills and budget are still cited as the biggest roadblocks to implementing these frameworks, highlighting a discrepancy between support and resource allocation.