Cyber Security News

Sophisticated Android malware tracks all your phone activities New Android malware can exfiltrate nearly everything you do on your phone.
Will Russia cut underwater internet cables? Military leaders warn of suspicious naval activity Around 400 fiber-optic cables are responsible for
US elevates the role of Cyber Command After months of talk and planning, US Cyber Command is now just as
BY MORGAN WRIGHT, OPINION CONTRIBUTOR — 05/04/18 11:12 AM EDT 107 THE HILL.com - Let’s say you wanted to send a secret
NSA triples metadata collection numbers, sucking up over 500 million call records in 2017 The National Security Agency revealed a
Tennessee Officials Are Trying To Get To The Bottom Of An Election Night Cyberattack The county mayor says no votes
Phone maker settles charges it let partner collect customers’ text messages BLU phones sent a massive amount of data to
Coding and Coercion Unions have been trying to organize software engineers for decades, with little success. Here's a look at
Long ago, the introduction of the Internet moved crime from physical to digital locations, where anti-fraud actors play a high-stakes
As 2017 draws to a close, we here at Easy Solutions have been reflecting on the biggest fraud events of

Cyber Security News

Why track cyber security news? Cyber security is a world unto itself. It’s a profession, an IT discipline and now a major industry. Companies, consumers and governments are spending billions of dollars a year on cyber security. Security also pervades many areas of life that have little to do, seemingly, with cyberspace. Thus, to keep up with the world in general, it’s helpful to stay aware of news that relates to cyber security.

For example, the dispute between the US government and Huawei is at once about international trade, national security, telecom industry competition… and cybersecurity. Security is a root issue with Huawei, given the suspicions about the company’s connections to the Chinese Communist Party (CCP). However, the company’s size, reach and technological innovation push the matter to the forefront of US-China relations.

cyber security newsOr, take consumer cyber risks. We cover cyber security news that deals with consumers’ exposure to cybercrime and fraud. Consumers are increasingly at risk for identity theft, credit card and other malfeasance at the hands of cyber criminals. The articles we curate on this subject come from law enforcement publications, mainstream media and specialized blogs.

Public policy is now being influenced (or should be) by cyber security news. Policy makers should be aware of how cyber security affect their jobs and constituents’ lives. For instance, the “smart city” is both an innovation and a threat. Using IoT sensors and advanced data analytics to improve municipal services is a great idea. However, the smart city also exposes government data to breach.

This is particularly urgent given the relatively insecure technologies (e.g. Chinese-made sensors) used for the smart city and the wireless connectivity that make it all possible. Add malicious nation-state actors to the mix, such as the ones currently paralyzing American cities with ransomware, and one can see the potential danger.

 

Sophisticated Android malware tracks all your phone activities

Sophisticated Android malware tracks all your phone activities

New Android malware can exfiltrate nearly everything you do on your phone.

Sophisticated Android malware tracks all your phone activities

Will Russia cut underwater internet cables? Military leaders warn of suspicious naval activity

Will Russia cut underwater internet cables? Military leaders warn of suspicious naval activity

Around 400 fiber-optic cables are responsible for transporting data for most of the world’s emails, text messages and phone calls.

Will Russia cut underwater internet cables? Military leaders warn of suspicious naval activity

US elevates the role of Cyber Command

US elevates the role of Cyber Command

After months of talk and planning, US Cyber Command is now just as important

US elevates the role of Cyber Command

America’s being invaded by China and Russia with chips, bits and bytes

NSA triples metadata collection numbers, sucking up over 500 million call records in 2017

NSA triples metadata collection numbers, sucking up over 500 million call records in 2017

The National Security Agency revealed a huge increase in the amount of call

NSA triples metadata collection numbers, sucking up over 500 million call records in 2017

Tennessee Officials Are Trying To Get To The Bottom Of An Election Night Cyberattack

Tennessee Officials Are Trying To Get To The Bottom Of An Election Night Cyberattack

The county mayor says no votes were changed, but a cybersecurity expert says that’s a premature assumption.

Tennessee Officials Are Trying To Get To The Bottom Of An Election Night Cyberattack

Phone maker settles charges it let partner collect customers’ text messages

Phone maker settles charges it let partner collect customers’ text messages

BLU phones sent a massive amount of data to firmware and data-mining provider.

Phone maker settles charges it let partner collect customers’ text messages

Coding and Coercion

Coding and Coercion

Unions have been trying to organize software engineers for decades, with little success. Here’s a look at the organizing campaign that might turn things around.

Coding and Coercion

AI vs AI – Can Predictive Models Stop the Tide of Hacker AI?

Long ago, the introduction of the Internet moved crime from physical to digital locations, where anti-fraud actors play a high-stakes game of detection and prevention, always working to stay one step ahead of fraudsters.

The battles of modern-day cybercrime follow the same pattern, with one major difference – cybercriminals are far more sophisticated than they were at the dawn of the internet age. Fraudsters are able to quickly change their attack vectors and strategies as needed, meaning that those of us in fraud detection and prevention are also continuously working to provide organizations with fraud protection they can depend on to keep them safe against all forms of online attacks.

Read More…

403 Forbidden

Seven Fraud Events that Shook the World in 2017

As 2017 draws to a close, we here at Easy Solutions have been reflecting on the biggest fraud events of the year. These seven events changed the fraud landscape and left lasting effects on organizations and their outlook on security for years to come. Read More…