ISMS.online News Roundup – 16th January 2020

Microsoft ends Windows 7 support: What should you do?

As of this Tuesday, Microsoft has stopped supporting Windows 7 in order to focus on emerging innovations, therefore users of the operating system will no longer get security updates to maintain the safety of their computers. In this excellent BBC News post, Sam Shead explains what this means for the one in four Windows users still running Windows 7.

Read the full article here.

Cable Haunt: Hundreds of millions of cable modems may be vulnerable to hijacking attack

Graham Cluley discusses the consequences of Cable Haunt, a serious flaw in the Broadcom firmware used in an unknown number of cable modems, including what a hacker could do with this, how many modems are affected, and what you should do if you’re affected, in this amazing blog post.

Read the full article here.

Why cybersecurity will impact everything in the new decade

Another ten years in the new millenium has passed and with that comes discussions over what the next decade has in store for cybersecurity. William Malone writes this great article for GCN on the potential impact going forward.

Read the full article here.

Calling UK Cyber Security companies – Applications for Cyber 2.0 are now open

TechNation has announced that applications are now available for their Cyber Security Growth Program Cyber 2.0! In this terrific article, Ollie Bone outlines how following the huge success of last year’s debut programme, ISMS.online being among the graduating cohorts, they are looking for the next batch of pre-Series A Cyber Stars to accelerate their progress.

Read the full article here.

Microsoft and NSA say a security bug affects millions of Windows 10 computers

CryptoAPI, a component of Windows 10 has recently been patched to fix a dangerous vulnerability affecting hundreds of millions of computers. This vulnerability allowed hackers to spof legitimate copies of software, making it easier to run it maliciously on vulnerable machines. Zack Whittaker writes for Tech Crunch following confirmation by Microsoft and the NSA.

Read the full article here.

How We Turn Cybersecurity Concepts Into a Classroom Staple

In this excellent article for EdSurge, Sam Bocetta explores how, given the sheer amount of sensitive data that we put on the internet on a regular basis, the unquestionable need for cybersecurity is not getting enough exposure in the education sector and some tips to strengthen your cyber hygiene.

Read the full article here.

University receives cybersecurity training grant

Louisiana State University has recieved $3.4 million to invest in 21 cybersecurity scholarships over a five year period, with the the first wave of places being awarded later this year. Control Engineering share the news from LSU’s press release.

Read the full article here.

Looking forward: The future of jobs in cybersecurity

Since our reliance on and adoption of advanced technology has become more widespread every year, it has shown the huge potential that comes with it, but also the greater risks. In this interesting TechTalks post, Jori Hamilton explores some of the possibilities that are uncovered as we move into the future and how careers can change in order to minimise the risks.

Read the full article here.

Five Ways Business Directors Can Prepare For The Future Of Cybersecurity

Its always worth being reminded of the fact that cybersecurity is continuously moving forward and as a result, there are those who are left behind to catch up. Advice pieces such as this one by Stefan Deutscher for Forbes serve as a valuable source of encouragement with a helpful overview of how to consider and approach it.

Read the full article here.

Three ways to prevent the UK from falling into data anarchy

In this brilliant article for City A.M., Deborah O’Neill discusses how companies, whether knowingly or unintentionally, use personal data in a discriminatory manner, and what can be done to stop this behaviour, as well as giving examples of how organisations utilise big data for different purposes.

Read the full article here.

A billion medical images are exposed online, as doctors ignore warnings

Millions of new medical images containing the personal health information of patients are exposed online every day, with about half of these images belonging to patients in the United States. In this interesting TechCrunch article, Zach Whittaker examines what actions have been taken to prevent this from happening.

Read the full article here.

Cookie consent: Most websites break law by making it hard to ‘reject all’ tracking

Liam Tung examines a new study that found only 11.8% of the most common CMPs used on UK websites have cookie consent forms that do not comply with GDPR regulations. He continues to discuss the degree to which these sites make it difficult to reject cookies, as more than half of the websites analysed do not provide a reject all option at all, in this excellent ZDNet article.

Read the full article here.

Cookies crumbling as Google phases them out

This fantastic BBC News article details how Google has revealed that it will reduce the number of website advertising cookies accessed through its Chrome browser over the next two years in response to demands for stronger privacy controls in relation to the study mentioned in the previous article.

Read the full article here.

Paypal confirms users may have been affected by security breach

Due to weaknesses in its security, Paypal has confirmed that user passwords have been at risk by hackers. Liz Daunton writes an informative piece for Consumer and Society, exploring a report submitted by security analyst, Alex Birsan.

Read the full article here.

Artificial Intelligence Projects Get Funding To Help Warship Crews Tackle ‘Information Overload’

The Ministry of Defense has confirmed that they will obtain £ 1 million in funding for Artificial Intelligence research projects developing technology to help warship crews deal with “information overload” and to transform the way in which Armed Forces crews and AI systems communicate with warships, aircraft and land vehicles by the 2040s, as outlined in this brilliant article for Forces Network.

Read the full article here.

Boing Boing bounces back after hack attempted to infect users with fake Adobe Flash update

In this wonderful article by Graham Cluley, for his blog, describes how on Friday, the popular blog Boing Boing was hacked. He details how malicious code inserted into their WordPress site that redirected users to a malware page controlled by a third party, as well as the fallout of this and the blogs response.

Read the full article here.

This Week in Tweets

Here are our top tweets from the #infosec and #cybersecurity Twitterverse.

Want To Receive Up-To-Date Articles, Help Materials And Infosec News?

Subscribe to our mailing list to stay informed about all of our latest updates and articles.