16 Jun Daily Rundown: K-9 Cyber Fighters, Cybercrime Pictures, Pentagon Investigates Breach
Cybersecurity news, odds and ends from Cybercrime Magazine
– Kerry Morgan, Cybercrime Reporter
Northport, N.Y. — Jun. 18, 2018
TODAY IN CYBER
The cybercrime stories we’re following, and you should too:
- Canadian federal government invests $500 million in cybersecurity strategy to help small businesses protect themselves against cyber threats.
- K-9s are our new cyber-crime fighters! Special class trains dogs to hunt down electronics, including smartphones and memory devices.
- Apple plans to close iPhone security loophole that police and law enforcement agencies have exploited to gain access to information on those devices.
- People were asked to draw cybercrime, and the results are interesting — pirate flags, skull bones, and … smiley faces?
- Looking for young and eager cyber employees? A breakdown of how to recruit and retain the next generation of the cyber force.
- Pentagon investigates breach into the network of a Defense Department contractor. Suspicion of Chinese or Russian involvement.
- Air Force Association develops CyberCamp for high school students at Great Falls College in Montana.
- Cyber threats are on the rise — and all companies are at risk. Businesses should have cybersecurity at the top of their list.
VIDEO
Cybersecurity and cryptography guru Bruce Schneier on cybercrime, and why artificial intelligence is necessary in the fight to protect data and funds.
QUOTEWORTHY
They said it, and it’s worth repeating:
“I don’t know that much about cyber, but I do think that’s the number one problem with mankind.”
– Billionaire businessman Warren Buffett
CALENDAR
Cybersecurity conferences and expos:
Aug. 4-9. Black Hat USA, Las Vegas. Information Security Briefings and Trainings. Now in its 21st year, Black Hat USA is the world’s leading information security event, providing attendees with the very latest in research, development and trends.
TERMINOLOGY
Cyber terms for newbies, students, teachers, IT pros and everyone else:
A rootkit is a type of malicious software that is activated each time the system boots up. Rootkits are difficult to detect as they are activated before your system’s Operating System has completely booted up.
Cybersecurity news, odds and ends from Cybercrime Magazine
Check back each business day for a new edition of the Daily Rundown!
– Kerry Morgan is a Cybercrime Reporter for Cybercrime Magazine.