Newly released documents reveal the National Security Agency improperly collected Americans’ call records for a second time, just months after the agency was forced to purge hundreds of millions of collected calls and text records it unlawfully obtained. The document, obtained by the American Civil Liberties Union, shows the NSA had collected a “larger than […]
Many software vulnerabilities are already known, and vendors have even issued patches, but the problem is there are so many patches that it’s often difficult for companies to keep up. Vulcan Cyber wants to help by bringing a level of automation to the patching operation, and in the process reduce exposure to known risks. Today, […]
WeWork announced today that it will acquire Waltz, a building access and security management startup, for an undisclosed amount. Waltz’s smartphone app and reader allows users to enter different properties with a single credential and will make it easier for WeWork’s enterprise clients, such as GE Healthcare and Microsoft, to manage their employees’ on-demand memberships […]
Microsoft today announced OneDrive Personal Vault, a new security layer on top of its OneDrive online file storage service that adds additional security features to keep your files save. The security features ensure that the only way to access these files is with a strong authentication method or two-step verification, which can include a fingerprint […]
Federal authorities have announced its latest crackdown on illegal robocallers — taking close to a hundred actions against several companies and individuals blamed for the recent barrage of spam calls. In the so-called “Operation Call It Quits,” the Federal Trade Commission brought four cases — two filed on its behalf by the Justice Department — […]
Security researchers say they have uncovered a massive espionage campaign involving the theft of call records from hacked cell network providers to conduct targeted surveillance on individuals of interest. The hackers have systematically broken in to more than 10 cell networks around the world to date over the past seven years to obtain massive amounts […]
With increased pressure on Chinese manufacturers like Huawei and ZTE, Shenzhen-based drone giant DJI has no doubt had cause for concern of late. In late-2017, the U.S. government’s Immigration and Customs Enforcement office raised concern that the company’s camera-equipped flying machines could be sending data back to China. A few weeks back, the Department of […]
Security vulnerabilities in LTE can allow hackers to “easily” spoof presidential alerts sent to mobile phones in the event of a national emergency. Using off-the-shelf equipment and open-source software, a working exploit made it possible to send a simulated alert to every phone in a 50,000-seat football stadium with little effort, with the potential of […]
Hotlinking happens when someone displays an image from your site by using its web link directly. They get to display the image on their website and have it sourced from your website. Each time it loads, the image is extracted from the source website’s server. That can happen without your permission and maybe even without your knowledge. For a simple analogy to explain hotlinking, imagine if someone used your fuel for their car. They’d be hotlinking your car’s fuel to make their own car run. Quite clearly, that’s not right….
Phishing attacks happen all the time. They can be emails from your friendly Nigerian prince, calls from the ‘IRS’, or fake websites designed to steal your credentials. If you’re not prepared to deal with phishing, sooner or later someone could even target your website. Fortunately, there are a lot of ways you can protect your …
The post 3 Ways to Protect Your Website from Phishing Attacks appeared first on The A2 Posting.