Weekly Security Roundup #21: Cyber Security and National Interest
Fight against online threats and cyber-crime continues.
This week we found a few interesting articles that indicate cyber-security becomes an important topic for public and state authorities. We have UK preparing specialists in the field, Estonia backing up vital digital information from a possible Russian invasion, the Hillary Clinton e-mail policy and the terrorists love-hate relationship with social media.
As for our security blog, we started the week in force with more than 50 security tips from IT experts, we continued with an important article on the main corporate cyber security risks and ended with a useful security guide for parents on keeping children safe.
Our goal is to bring you the latest security news from the digital world. And this is what we do.
These are the 10 security articles of the week that you should read in order to improve your online security.
Security articles of the week
Companies in the Western part of the world are affected by a great number of cyber-criminal actions. Should they strike back? Probably. But are they capable of launching an attack on hackers? Are they able to detect and take down the malicious servers that launched the initial attacks?
We have already talked about how social media is used by terrorist organizations to spread messages and gather real or virtual followers. But now social media, and in this case Twitter, fights back. Is it a real or a virtual war?
How do we find IT specialists? Where do you take them from? As this article indicates, maybe we should train them. We could organize interviews and talk to people, but there’s no better test than a real time simulation of a cyber-security attack.
It’s all about semantics. Deep web or dark web? What’s the difference? Deep web consists of pages that aren’t indexed by search engines, whereas dark web is a number of websites that can’t be reached with normal web browsers and can only be accessed with special web browsers, like Tor browser. Easy, right?
Security news that Hillary Clinton used her private unencrypted e-mail address for state affairs created serious concerns for the American public. Though she insisted there was no confidential information disclosed and no security breach, we already know that might not be true.
What are the 5 cyber security threats to information systems today? We can tell you that this survey revealed “vulnerable web applications” are at the top. But, how can we tell a web application is secure or not? Read the article to find out.
There is no secret that 2014 was a good year for online criminals. The staggering number of data breaches reached new levels that no one actually expected. But why? This report mentions among the main causes the software vulnerabilities and zero-day attacks.
When you have a neighbor like Russia, you need to be ready for everything. And to be ready, means to back-up your data and assure continuity of public online services. Last years and repeated Russian online attacks gave more reasons to Estonia to create a digital continuity.
These days Twitter seems to be at war with everybody. We all heard about their brave campaign against ISIS’ evil forces, but not so many people noticed the latest fight against online sexual harassment. What’s next, Twitter?
Are you blogging? Then, you know that WordPress is the most popular platform for this type of activity. Are you using a backup plugin? If you don’t, then you should. Otherwise, you are part of more than 70% of WordPress users that don’t use one.
We are sure there are other important security news out there. So please let us know, what security news did we miss and should have been included here?
This post was originally published by Aurelian Neagu in March 2015.