October 07, 2014
On October 9th, 2014, Dennis Meharchand, Valt.X CEO, will address the NATO Council of Canada's Cyber Security Summit 'Code Wars" Cyber Security in the Age of the Digital Fortress at York University in Toronto. He will be part of a panel discussion on Public Security. To register, click on this link.
The Nato Council of Canada strives to educate and engage Canadians about NATO and NATO’s goal of peace, prosperity and security. The NATO Council of Canada ensures that we have an informed ci...
October 03, 2014
Banks are supposed to be among the most secure places on earth, guarded against physical attacks and cyber intrusions by extensive security measures.
But after JPMorgan Chase, the country's largest bank, said this week that more than 80 million customers were affected by a breach of its computer system, security experts warn that Wall Street remains vulnerable to cyberattacks and other industries may be even worse off. The JPMorgan attack affected significantly more people than many expe...
September 25, 2014
Unix servers and PCs can be protected against vulnerabilities like the Bash Bug by using Valt.X software, hardware or solid state hard drives. Recover instantly from an attack. Protect yourself!
Now to the article:
Right now, security professionals are scrambling to fix a security flaw some are calling Shellshock. It's a major vulnerability related to Bash, a computer program that's installed on millions of computers around the world. There's been a lot of confusion in mainstrea...
September 02, 2014
Published 27 August 2014
From The Department of Homeland Security NewsWire
Cyberattacks loom as an increasingly dire threat to privacy, national security, and the global economy, and the best way to blunt their impact may be a public-private partnership between government and business, researchers say. The time to act is now, however, rather than in the wake of a crisis, says an expert in law and technology. The expert says that an information-sharing framework is neces...
September 01, 2014
Routers manufactured and sold by Chinese security vendor have a hard-coded password that leaves users with a wide-open backdoor that could easily be exploited by attackers to monitor the Internet traffic.
The routers are sold under the brand name Netcore in China, and Netis in other parts of the world, including South Korea, Taiwan, Israel and United States.
According to Trend Micro, the backdoor — a semi-secret way to access the device — allows cybercriminals the possibility to byp...
August 25, 2014
Sony's PlayStation network has been shut down after cyber-attackers overloaded it in what's known as a distributed denial of service attack.
In a blog post Sony said that no personal information had been accessed.
On Sunday an American Airlines flight carrying a senior Sony executive was also diverted following a bomb scare.
The group claiming responsibility for closing down the network also tweeted suggesting there was a security threat to the flight.
'Fixing the issue'
In a blog Sony...
August 24, 2014
Cybersecurity leapt onto the list of the top five concerns for U.S. electric utilities this year, yet fewer than a third say they’re prepared to meet the growing threat of an attack, according to a new survey. “The industry is paying attention and actively seeking ways to bolster security practices to limit power system vulnerability,” says an annual report from the consulting, construction and engineering firm Black & Veatch titled "2014 Strategic Directions: U.S. Electric Industry." “We...
August 09, 2014
The CBC has reported that Russian hackers have stolen 1.2 billion user names and passwords in a series of internet heists affecting 420,000 websites, according to a Milwaukee firm that specializes in uncovering online security breaches.Hold Security CEO Alex Holden said more accounts could be compromised if the hackers sell the information they have gathered.
The reported break-ins are the latest incidents to raise doubts about the security measures that both big and small companies use to ...
August 05, 2014
“These malicious actors are constantly probing Government of Canada systems and networks for weaknesses so that they infiltrate them and steal valuable information,” Forster, head of CSEC, wrote in a letter to the editor of the Toronto-based Globe and Mail newspaper.
“When we detect emails or other communications that contain malware or other threats, we block, collect and analyze them. And, we work with appropriate departments to take action to neutralize the threat.”
The operative phra...
January 18, 2014
Homeland security subcommittee approves the National Cybersecurity and Critical Infrastructure Protection Act of 2013. Click here to access article at Government Security News.
See our Resources page for Information on Valt.X and the technology Valt.X has developed to ensure endpoint computing device integrity