Cyber Security News

Oct 30 2018

1.

Can We Predict When a Crime Will Take Place?

2.

ASD Chief Slams Corporates Contemplating "Hacking Back"

3.

Safeguarding Global Critical Networks Now and in the Future

4.

21% Of All Files in the Cloud Contain Sensitive Data

5.

Assange Loses Court Case Over Cat Duties, Internet Bills

6.

Cathay Pacific Data Leak Piques Law Firm's Class Action Interest

7.

New Handbook Provides Guidance to Healthcare Delivery Organizations on Preparation and Response to Medical Device Cyber Security Incidents

8.

'Leaked' iPad Pro Case Shows Off That Surprising USB-C Port

9.

Creative Hack Gives You Stunning iPhone Macro Shots

10.

AI-Facilitated Product Aims to Stop Spear-Phishing Attacks

11.

Internet-Exposed HMIs Put Energy, Water Facilities at Risk

12.

92% Of External Web Apps Have Exploitable Security Flaws Or Weaknesses

13.

New SamSam Ransomware Campaign Aims at Targets Across the US

14.

This Is How Hackers Can Take Down Our Critical Energy Systems Through the Internet

15.

This Is How Hackers Can Wipe Your Memory and Steal Your Thoughts

16.

5 Ways to Keep Email Hacking From Damaging Your Public Life

17.

Chinese Spies Indicted for Alleged Hacking Of US Companies

18.

Groups Ask FTC to Probe Children's Apps Over Ad Practices

19.

UK Data Breach Fines Double as GDPR Sets in

20.

Under-5s Besieged By 'Manipulative' App Ads

21.

Data Shows Millions Leaving Crypto Wallets Tied to Long-Troubled Exchange

22.

Australia's Data Breaches Are a 'Sign Of Naiveté'

23.

Cyber Supply Chain Task Force to Meet Soon

24.

US Indicts Chinese Hacker-Spies in Conspiracy to Steal Aerospace Secrets

25.

US Accuses Chinese Spies Of Hacking Aerospace Firms

26.

Watch Out for Manipulative Ads in Your Kid's Mobile Apps

27.

Parker Solar Probe Breaks Record for Sun Close Approach

28.

By Spring, Government Aims to Halve 600,000 Security Clearance Backlog

29.

Cyber Supply Chain Task Force to Meet Soon

30.

'Spyro' the Dragon Drone Takes Flight

31.

By Spring, Government Aims to Halve 600,000 Security Clearance Backlog

32.

Scroll to Make Aster Network Data and Transactions More Secure

33.

Server Configuration Is Top Healthcare Software Vulnerability

34.

Thousands Of Critical Energy and Water Systems Exposed Online for Anyone to Exploit

35.

The Shadow Cyber Regulator That Will Determine the Future Of Self-driving Cars: the FTC

36.

The Shadow Cyber Regulator That Will Determine the Future Of Self-driving Cars: the FTC

Secmentis specializes in offensive security and provides penetration testing services to organizations worldwide. We provide penetration testing services such as, external and internal network penetration testing, web application and mobile application penetration testing, and physical penetration testing and social engineering.

The headlines on Secmentis Cyber Security News are selected by computer algorithms that determine which headlines are displayed and in what order.

 Hackers are active 24/7. Are you?

Talk to us today to find out how our experts can best help you