News February 2017 – Cyber Security Review
Menu

Cyber Security Review

News • Insights • Analysis

Twitter

Primary Menu

Skip to content
  • About the Review
    • Advanced Persistent Threat
    • Critical Infrastructure Protection
      • Aviation
      • Banking and Finance
      • Defence and Aerospace
      • Education and Academia
      • Energy
      • Government
      • Healthcare
      • Industrial Security
      • Telecommunications
      • Transportation
      • Utilities
    • Cybercrime
      • DDoS
    • Malware
    • Network Security
  • News
    • News – May 2022
    • News – April 2022
    • News – March 2022
    • News – February 2022
    • News – January 2022
    • News Archive
  • Articles
  • Events – Media Partners
  • Editorial
    • Editorial contributors
  • Subscribe
    • Cyber Security Review eNewsletter Subscription Form
    • Cyber Security Review – past PDF or Print editions
  • Resources
    • Print editions archive
    • Useful Links
  • Contact Us
Search

Category: News February 2017

Yahoo offers new details on breaches to Senate committee

Posted onFebruary 28, 2017December 23, 2020

Since Yahoo disclosed two mega-breaches late last year, its executives have met almost daily with CEO Marissa Mayer for working sessions focused on improving the company’s cybersecurity posture. Employees have also received weekly security presentations from Yahoo CISO Bob Lord Read More …

CategoriesNews February 2017TagsC-Suite, CXO, Data Breach

Google Discloses Another ‘High Severity’ Microsoft Bug

Posted onFebruary 27, 2017March 18, 2017

Google Project Zero disclosed Monday a “high severity” vulnerability it found in Microsoft’s Edge and Internet Explorer browsers that could allow remote attackers to execute arbitrary code. The revelation adds yet another vulnerability to a growing list of known bugs Read More …

CategoriesNews February 2017TagsMalware

Even bakeries get hit by hackers, top insurer warns ‘ill-equipped’ small businesses

Posted onFebruary 27, 2017July 14, 2018

Bakers are not immune from the hacking epidemic spreading across Europe, a top insurer has warned. Hiscox boss Bronek Masojada said small businesses faced just as much risk as large ones from cyber crime – but many did not have Read More …

CategoriesNews February 2017TagsCybercrime, Food and Agriculture, Hacking

Boeing Notifies 36,000 Employees Following Breach

Posted onFebruary 27, 2017July 14, 2018

A Boeing employee inadvertently leaked the personal information of 36,000 of his co-workers late last year when he emailed a company spreadsheet to his non-Boeing spouse. News of the breach surfaced earlier this month after a letter (.PDF) from Boeing’s Read More …

CategoriesNews February 2017, Front pageTagsData Breach, Data Theft, Personal Information, USA

Treason charges against Russian cyber experts linked to seven-year-old accusation

Posted onFebruary 26, 2017July 14, 2018

Treason charges brought in December against two Russian state security officers and a cyber-security expert in Moscow relate to allegations made by a Russian businessman seven years ago, according to the businessman and a source connected with the investigation. They Read More …

CategoriesNews February 2017TagsCyber Espionage, Cybercrime, Russia

Could cybersecurity sink your next M&A?

Posted onFebruary 26, 2017December 23, 2020

Most CFOs don’t expect to see cybersecurity on their due diligence checklist for mergers and acquisitions. Yet cybersecurity – or a lack thereof – has massive implications for any deal: after all, the average data breach now costs organisations in Read More …

CategoriesNews February 2017, Front pageTagsBanking and Finance, C-Suite, CXO

Cloudbleed: How to Protect Yourself After the Data Leak

Posted onFebruary 25, 2017March 18, 2017

Cloudflare revealed a bug in its code caused sensitive data to leak from major websites that use its services, including big names such as Uber, Fitbit, 1Password, and OkCupid. There are an estimated 4.2 million domains using Cloudflare, which may Read More …

CategoriesNews February 2017TagsCloud Security

NSA snoops told: Get your checkbooks and pens ready for a cyber-weapon shopping spree

Posted onFebruary 25, 2017July 14, 2018

NSA and US Cyber Command boss Mike Rogers has revealed the future direction of his two agencies – and for the private sector, this masterplan can be summarized in one word. Kerching! Speaking at the West 2017 Navy conference on Read More …

CategoriesNews February 2017, Front pageTagsCyber Weapon, Government, USA

NATO Warns Cyber Attacks Are a Threat to Democracy Itself

Posted onFebruary 24, 2017March 18, 2017

NATO is showing concern about the impact of cyber attacks, considering that they are a threat to individuals and organizations, but also to the fundamental nature of democracy. According to Jamie Shea, deputy assistant secretary general for emerging security challenges Read More …

CategoriesNews February 2017TagsCyber Domain, Intergovernmental, NATO

Security researchers announce “first practical” SHA-1 collision attack

Posted onFebruary 23, 2017November 16, 2020

Security researchers at the CWI institute in Amsterdam working with a team from Google Research say they have found a faster way to compromise the SHA-1 hash algorithm — announcing what they describe as “the first practical technique for generating Read More …

CategoriesNews February 2017TagsMalware, Netherlands, Research and Development

Post navigation

← Older posts

FEATURED CONTENT


CYBERSECURITY TRENDS IN 2022
By Eyal Dorfman


INCIDENT RESPONSE SERVICES: WHO’S IT FOR?
By Iron Range Cyber


HOW HOSPITALS CAN PREVENT A CYBERSECURITY CRISIS IN HEALTHCARE
With ransomware attacks in the healthcare sector on the rise, Bernard Montel, EMEA Technical Director and Security Strategist at Tenable, shares his thoughts on how healthcare organisations can avoid becoming a victim of cyber criminals.

THE UK NATIONAL CYBER STRATEGY 2022: DOES IT GO FAR ENOUGH & WHAT’S TO COME?
By James Rees, Managing Director, Razorthorn Security

FUELLING THE TALENT PIPELINE IN LONDON REQUIRES SERIOUS INVESTMENT IN CYBER SKILLS
By Dr Vahid Heydari Fami Tafreshi, senior lecturer in Cybersecurity and Networks, Computing Courses Provision Manager at Staffordshire University London


WHAT ARE THE LATEST CYBERSECURITY STANDARDS?
By Ruben Bonan Founder of Marketing Marvel


A BRIEF OVERVIEW OF SYSTEMS RELIABILITY
By Haya Altaleb and Rajnai Zoltán, Óbuda University, Doctoral School on Safety and Security Sciences

SUPPORTING CORPORATE GOVERNANCE ON A BLOCKCHAIN BASIS
By Dr. Katalin Szenes CISA, CISM, CGEIT, CISSP and Bence Tureczki PhD student, AI – Blockchain – Security Knowledge Center of Óbuda University


DDOS PANDEMIC: HOW THE CORONA CRISIS SPURRED SOME OF THE BIGGEST DDOS ATTACKS
AND WHY YOU SHOULD CARE
By Ramil Khantimirov, CEO and co-founder of StormWall


HOW RANSOMWARE AUTHORS HIT HEALTHCARE SECTOR
By David Balaban, computer security researcher


THE HUMAN FIREWALL – THE HUMAN SIDE OF CYBER SECURITY
By Annamária Beláz and Zsolt Szabó, Doctoral School on Safety and Security Sciences, Óbuda University, Budapest, Hungary


APPLICATIONS OF LORAWAN TECHNOLOGY
By Döníz Borsos PhD student, Óbuda University, Doctoral School on Safety and Security Sciences, Hungary


WARFLYING – 2.4 GHZ AND 5 GHZ WIRELESS NETWORK DETECTION BY DRONE IN CRITICAL INFRASTRUCTURE
By Barnabás Sándor, Óbuda University, Doctoral School for Safety and Security Sciences, Budapest, Hungary
 

SUBSCRIBE
to

Cyber Security Review
insights, threat intelligence
and news round-up

Copyright © 2022 Cyber Security Review. All Rights Reserved. Privacy Policy
Catch Base by Catch Themes
Scroll Up
  • About the Review
    • Advanced Persistent Threat
    • Critical Infrastructure Protection
      • Aviation
      • Banking and Finance
      • Defence and Aerospace
      • Education and Academia
      • Energy
      • Government
      • Healthcare
      • Industrial Security
      • Telecommunications
      • Transportation
      • Utilities
    • Cybercrime
      • DDoS
    • Malware
    • Network Security
  • News
    • News – May 2022
    • News – April 2022
    • News – March 2022
    • News – February 2022
    • News – January 2022
    • News Archive
  • Articles
  • Events – Media Partners
  • Editorial
    • Editorial contributors
  • Subscribe
    • Cyber Security Review eNewsletter Subscription Form
    • Cyber Security Review – past PDF or Print editions
  • Resources
    • Print editions archive
    • Useful Links
  • Contact Us