December 9, 2016
UNM4SK3D: IBM, DailyMotion, and Android
December 9, 2016
Fortune 500 Companies have a new secret weapon against cyber crime: IBM's Watson for Cyber Security.
This overachieving supercomputer uses machine learning and language processing to sift through vast amounts of data, both structured and unstructured. As Watson distinguishes patterns, it is able to apply context to those patterns, helping professionals identify if activity is harmful.
The best part? Watson's technology spans across industries and among those companies taking advantage are Sun Life Financial and California Polytechnic State University.
7% of organizations currently use cognitive technology- IBM
If you're interested in this topic, checkout the blog "A Buzzword to Rattle your Brain."
#hackedDailyMotion can be added to the laundry- list of companies who have fallen victim to a security breach.
If you're a user of the site, beware! Approximately 85 million users' email addresses, usernames and passwords have been exposed by the hack. According to LeakedSource, it is hypothesized that the breach occurred October 20th, but news is just beginning to surface. DailyMotion has yet to comment on the attacks, so one can only speculate how it occurred.
What can you do to protect your information? The moral of this story is to first, create strong passwords, then, don't reuse them for every account you create, and lastly, add multi-factor authentication when possible.
According to a report from TeleSign, nearly 3 out of 4 consumers use duplicate passwords, many of which have not been changed in five years or more.
For more juicy info on passwords, try the 0P3N post "Create Great Passwords By the Book."
Good News Android users- Your friends at the 'Big G' (Google) resolved 74 vulnerabilities in the latest round of Android platform updates.
One of the most severe flaws, deemed 'The Dirty Cow' vulnerability is not spiked chocolate milk, but CVE-2016-5195, which enables hackers to escalate to root privileges through a race condition bug and gain write-access to read-only memory.
The patches also address 10 other bugs categorized as 'critical.' Comforting. Recently, Android's media server and libraries have been under scrutiny from security researchers in relation to vulnerabilities such as these.
When used from a military perspective, critical vulnerabilities are defined as an aspect of a critical requirement which is deficient or vulnerable to direct or indirect attack that will create decisive or significant effects.
Become an expert in this area, "Vulnerability Assessment & Penetration Testing, An Analysis" will help.
#newcertalertThis week's newest skill certification test is: Open System Interconnection (OSI) ModelWhy is OSI knowledge useful? For those of you looking to enter the cyber security industry, this certification provides the baseline communication functions of computing systems without regard to their underlying internal structure and technology. Lower layers of this model are hardware oriented, while the upper levels represent software. A good understanding of both is critical to any IT job.
One third (35%) of cyber security jobs call for an industry certification, compared to 23% of IT jobs overall. -Burning Glass Technologies Research, 2015The point is, getting a leg up in the job market essentially requires a certification. If you're hesitant to get certified, and want an insight into the test taking experience, read "I Passed My First Skill Certification: So Easy a Caveman Could Do It." Olivia Lynch is the Marketing Manager at Cybrary. Like many of you, she is just getting her toes wet in the field of cyber security. A firm believer that the pen is mightier than the sword, Olivia considers corny puns and an honest voice essential to any worthwhile blog.Now Reading Contagious: Why Things Catch On, By Jonah Berger