Solar Panel Flaws Put Power Grids Security at Risk: Researcher
“Could allow widescale, lasting outages if hacked”
Researcher Willem Westerhof has identified several serious vulnerabilities in widely used solar power processes that he believes could trigger intense outages for thousands of people. Calling the potential scenario “Horus,” after the ancient Egyptian divine, Westerhof outlines how an attack on solar panel systems could cause billions in damages.
UK organisations could face huge fines for cyber security failures
“Fines of up to £17m in talks”
British organizations could be hit with fines amounting to 4% of global turnover if measure to ensure cybersecurity are not undertaken. Financial penalties, according to the proposals, are intended to be used only as a last resort and not applicable if the institutions can claim that they assess and protect against risk adequately.
Three Hungarian banks targeted by phishing attempts: central bank
“No funds reported as lost”
Three major Hungarian banks have been the targets of phishing attempts in the last several months, with earliest reports of attacks in the month of June. The National Bank of Hungary, the nations central bank who oversees regulations for lending institutions and financial markets, has indicated that no funds have been lost but advises caution in future processes.
Top 5 tools to protect internet privacy
“Learn how to protect and monetize data here”
Years ago the big web search engines like Google, Bing, Yahoo, etc., began to harvest and monetize user web data. This resulted in a public outcry for security and protection services, birthing a new industry. Governments allowing ISP’s to engage in the same practices has created an even bigger demand for these products. Check out the full article for the top 5 internet privacy tools.
Hackers hiding malware threats inside images, report says
“Steganography used to hide malicious code”
Kaspersky Labs is reporting that Cybercriminals are using what has been called the equivalent of cyber steganography, the hiding of hidden messages inside images to conceal activities on a targets computer. Researchers are seeing at least three large-scale operations employing this shifty technique as regular methodology, prompting developing security concerns.
Enjoy your read? Check out our other content here.