Security News
On Thursday, Cisco published two blog posts outlining its hybrid work strategy and company tech enabling distributed workforces. While the articles provide a specific glimpse into the strategy and approach for one tech titan, the underlying concepts of enabling remote and on-site teams are front and center for companies worldwide in the age of hybrid work.
The Tech Support Scams YouTube channel has been erased from existence in a blaze of irony as host and creator Jim Browning fell victim to a tech support scam that convinced him to secure his account - by deleting it. "So to prove that anyone can be scammed," Browning announced via Twitter following the attack, "I was convinced to delete my YouTube channel because I was convinced I was talking [to YouTube] support. I never lost control of the channel, but the sneaky s**t managed to get me to delete the channel. Hope to recover soon."
The British government wants to make Amazon, Google, and other digital service providers report cybersecurity breaches to the Information Commissioner, according to newly published plans. Due to Brexit, the government can amend the UK's Network and Information Security Regulations to let the Information Commissioner's Office, the local data watchdog, dictate what kind of cybersecurity breaches must be reported to it.
If you want people to trust the photos and videos your business puts out, it might be time to start learning how to prove they haven't been tampered with. Microsoft has a quiz you can take to see if you can spot deepfakes yourself; that's less a training tool and more an attempt to increase awareness and media literacy.
Millennials and Gen Z - not Boomers - fall prey most frequently, according to Microsoft in its 2021 Global Tech Support Scam Research report, released Thursday. Tech support scams involve cybercriminals convincing users they have malware or other problems with their computer that can best be addressed with unsolicited proactive assistance.
OT engineers using Automation Server can download logic and configure their PLCs through the cloud-based Automation Server management console. WAGO PFC100/200 meanwhile is a series of PLCs that make heavy use of the CODESYS runtime, and most of the communication, configuration and programming of these PLCs is done through the CODESYS platform.
Despite volatility of the risk landscape in the wake of the COVID-19 pandemic, most organizations still rely on manual tools and technologies for internal audit processes, a MetricStream survey reveals. The state of internal audit processes 67% of internal auditors have had to change their plans, and reprioritize audit activities during the pandemic.
Private Israeli firm NSO Group has denied media reports its Pegasus software is linked to the mass surveillance of journalists and rights defenders, and insisted that all sales of its technology are approved by Israel's defence ministry. NSO spokesman Oded Hershkovitz told Israel's Army Radio the list of phone numbers was "Not connected" to NSO, but rather to other companies and open-source software.
Virginia Tech says it was targeted in two recent cyberattacks but feels confident no data was stolen. Virginia Tech spokesman Mark Owczarski told the Roanoke Times Friday a few university units used Kaseya, a U.S. software company exploited in early July in a massive ransomware attack that snarled businesses around the world.
Of course, investing in new technology to improve security always involves some expense. Security teams have to keep pace to provide an effective defense with integrated tools that automate processes and enable streamlined collaboration.