Wired

A Controversial Plan to Encrypt More of the Internet

The road to routing all Domain Name System lookups through HTTPS is pocked with disagreements over just how much it will help. The security community generally agrees on the importance of encrypting private data: Add a passcode to your smartphone. Use a secure messaging app like Signal.
/
Citrix’s Chief Security Architect on how to avoid misconfiguration

Citrix’s Chief Security Architect on how to avoid misconfiguration

Sameer Sharma, Sr. Consultant for Cloud Architecture and Security at Citrix, recently highlighted five of the top cloud security risks. In his post, he provides high-level guidance for each cloud security risk, one of which is misconfiguration. In August 2019, the Cloud Security Alliance released The Egregious
/
BBC Tech

Lancaster University students’ data stolen by cyber-thieves

Students’ personal data has been stolen in a “sophisticated and malicious” phishing attack at Lancaster University. Officials said the information had been used to send bogus invoices to applicants.

“A very small number” of student records, phone numbers and ID documents were also accessed, it said.

The breach has been reported to police and the Information Commissioner’s Office. In a statement, the university said it became aware of a breach on Friday and has been working to secure its systems. It said the data includes names, addresses, phone numbers and emails, related to students who had applied to join the university in 2019 and 2020.

“We are aware that fraudulent invoices are being sent to some undergraduate applicants,” it said. “At the present time, we know of a very small number of students who have had their record and ID documents accessed.”

Read Full Source

  • Articles
BBC Tech Contributor
BBC Tech News
BBC Technology. Providing technology related international news and resources.

POWERPOINT COMIC LICENSING | CLICK TO SEE MORE

Cloud Computing In Education

Cybersecurity Policies Must Address Internal Threats

Cybersecurity Policies The contentious U.S. election campaign offered up many highlights, but the aftermath of election night – explosive cyberattack allegations – provided even more ...
Cloud Monitoring and Data Performance Services

Cloud Monitoring and Data Performance Services

CLOUD PERFORMANCE MONITORING Monitoring and evaluation in cloud computing are essential processes. They determine whether a company’s applications on the cloud are effective, safe, and efficient ...
Sam Bowman

Medical Data in the Cloud: What Are the Risks?

Medical Data in the Cloud Executive-level healthcare leaders must have a thorough understanding of cloud-based security risks. Patient data can vary from simple information such ...
SD Wan Speeds

Debunking some common SD WAN myths

Common SD WAN Myths There are few buzzwords in the networking world as current as ‘SD WAN’ – and depending what you read, the technology ...