Remove Meeting Remove Military Remove Security Remove Video
article thumbnail

Calendar Meeting Links Used to Spread Mac Malware

Krebs on Security

Malicious hackers are targeting people in the cryptocurrency space in attacks that start with a link added to the target’s calendar at Calendly , a popular application for scheduling appointments and meetings. The attackers impersonate established cryptocurrency investors and ask to schedule a video conference call.

Phishing 277
article thumbnail

Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos

The Security Ledger

In this episode of The Security Ledger Podcast (#255) host Paul Roberts interviews Niels Provos of Lacework about his mission to use EDM to teach people about cybersecurity. The post Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos appeared first on The Security Ledger with Paul F.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

The Last Watchdog

Chief Information Security Officers were already on the hot seat well before the COVID-19 global pandemic hit, and they are even more so today. They must rally the troops to proactively engage, day-to-day, in the intricate and absolutely vital mission of preserving the security of IT assets, without stifling innovation.

Security 309
article thumbnail

NSA "Red Disk" Data Leak

Schneier on Security

ZDNet is reporting about another data leak, this one from US Army's Intelligence and Security Command (INSCOM), which is also within to the NSA. Red Disk was envisioned as a highly customizable cloud system that could meet the demands of large, complex military operations. This doesn't feel like a big deal to me.

article thumbnail

The U.S. Innovation and Competition Act: Senate Passes Sweeping $250 Billion Bill to Bolster Scientific Innovation and Compete With China

Data Matters

semiconductor production, scientific research, development of artificial intelligence, and space exploration in the face of growing economic, technological, and military competition from China. Division D – Homeland Security and Governmental Affairs Committee Provisions. Division E – Meeting the China Challenge Act of 2021.

article thumbnail

List of data breaches and cyber attacks in July 2020 ­– 77 million records breached

IT Governance

Four military schools in Canada targeted in ‘mysterious’ cyber attack (unknown). Iranian spies accidentally leaked videos of themselves (unknown). Las Cruces school meeting zoom-bombed (unknown). CNY Works jobseekers Social Security numbers exposed in suspected ransomware attack (56,000).

article thumbnail

Amnesty International creates new global human rights digital archive with Preservica

Preservica

The digital archive will streamline secure access to information for up to 700 people across its 20 international offices working to defend human rights. Ensuring the secure capture of what we consider to be evidence of human rights abuses was a major factor in our decision to choose a system like Preservica,” says Bryony. “We