Weekly Security Roundup #10: Security Lessons After Sony Pictures Hacking
Fight against online threats and cyber-crime continues.
In the IT industry, security articles and agencies continue to analyze and draw conclusions from the Sony Pictures massive breach and
apparently, the Interview movie has been cancelled. Have the hackers won?
Our own security blog provided 6 important Internet security predictions that will affect all of us in 2015.
Our goal is to bring you the latest security news from the digital world. And this is what we do.
These are the 10 security articles of the week that you should read in order to improve your online security.
Security articles of the week
Christmas time is upon us and everybody is out there shopping for family members and friends. But hackers and online criminals are also expecting your credit card details. So, read this article and find out about the scams and schemes created for you.
Major corporate data breaches seem to be like weather. They just happen at a certain moment, no one can say when. Apparently, with so many software vulnerabilities, malicious software and not to forget, the human element, these attacks take place and will affect us for sure. So, maybe we should treat them like car accidents and simply get a cybersecurity insurance?
The hackers won, Sony Pictures cancelled Interview and dirty secrets have been spread all over the Internet. This is for sure a Christmas this company will remember. But maybe there are a few things that could be improved by Sony Pictures, especially their image and maybe, just maybe…their security policy.
If it is proved and established that North Korea did launch the Sony Pictures cybernetic attack, what should we do then? Or what should the
United States do? Are there any ways to retaliate without setting the world on fire?
How much valuable information is it gained by breaching your e-mail inbox? Is it about the bank account financial situation or about the sensitive data that may lead to identity theft? Or is it the fact that the same e-mail password has been used for other online accounts? What else are you losing by losing control of our e-mail address inbox?
They have long been among us and most times they simply disappear as fast as they have appeared online, leaving their cyber-victims affected about the negative experience they had by meeting them. But no more! A group of journalists and researchers have assembled to stop this Internet threat. No more trolling!
Bots have evolved along the years and are now more than humans. Why should we be interested about this issue? It is quite simple. In the cyber-criminal world, they are the first element in an infected computer sending private sensitive information to servers controlled by hackers. Can you tell for sure your computer is not already infected?
What is the cloud security? Where exactly is our data? And is it safe? The virtualized networks are closely connected to the cloud infrastructure. What advantages do we have from the cloud security and why these technology is the next step in the future?
There’s nothing more important these days than hearing and reading about the massive Sony Pictures hack. Do you want your company to be the next victim? Read the article and learn how to establish a strong security policy for your employees.
This woman posted on Twitter over 45,000 messages to glorify violence, war and extremism in just one year. Of course, she is accused of spreading terrorist messages and was denied setting up any new Twitter account in the future. Now, that’s trolling at a higher level.
We are sure there are other important security news out there. So please let us know, what security news did we miss and should have been included here?
This post was originally published by Aurelian Neagu in December 2014.