Tag Archives: ictacademy

Deloitte Says ‘Very Few’ Clients Hit by Hack

Deloitte said Monday that “very few” of the accounting and consultancy firm’s clients were affected by a hack after a news report said systems of blue-chip clients had been breached. Deloitte said it immediately contacted government authorities and the affected … Continue reading

Posted in News | Tagged , , , | Leave a comment

German elections vulnerable to hacking: ‘cyber-warfare’ say security pros

Chaos Computer Club warned that software being used to tabulate and transmit vote totals in Germany’s upcoming parliamentary elections contains major vulnerabilities; election hacking equals cyber-warfare says security pros On Thursday last week hackers from the Germany-based Chaos Computer Club … Continue reading

Posted in News | Tagged , , , , , , , | Leave a comment

Could CareFirst Data Breach Case Be Headed to Supreme Court?

Federal Court Grants Health Plan’s Petition to Appeal to High Court Source: inforisktoday Could the class action lawsuit filed against CareFirst Blue Cross Blue Shield after a 2014 cyberattack impacting 1.1 million individuals be the first data breach case headed to the … Continue reading

Posted in News | Tagged , , , | Leave a comment

Massive IoT Exploit: More than 1,700 valid Telnet credentials for IoT devices leaked online

Security researchers are warning of the availability online of a list of IoT devices and associated telnet credentials. The list has been available on Pastebin since June, but last week it was also shared via Twitter by the researcher Ankit … Continue reading

Posted in News | Tagged , , , , | Leave a comment

Payment security: What are the biggest challenges?

With cybercrime on the increase, payment card security is increasingly a focus for companies and consumers alike. The Payment Card Industry Data Security Standard (PCI DSS) is there to help businesses that take card payments protect their payment systems from … Continue reading

Posted in News | Tagged , , , , , , | Leave a comment

Strategies for developing an Internet emergency response system

Published on PCWorld.al Control the flow of information All events occurring in the security field i.e. vulnerabilities, compromises, crashes, different attacks, or cause-of-action takes the basis and the starting point for the information flow. A process or cycle that defines … Continue reading

Posted in CyberSec, Personal Blogs | Tagged , , , , | Leave a comment