Copy
Oceania Highlights with Rugby Review
Oceania Highlights with Rugby Review
View this email in your browser
How strong is YOUR password?


 
CYBER SECURTY GUIDENCE - 10 STEPS TO MANAGE COMMON CYBER RISKS
 


Oceania Highlights Cyber Security

This month's issue is dedicated to cybersecurity. There have been hacking attacks around the world that have left individuals and organizations vulnerable. In this issue we explore what is going on in cybersecurity and what we need to do on our work and home computer. Biggest suggestion is update your computers to the current version of not only your operating system but all of your software. Also, make sure that your anti-virus has been updated. 

If you have any questions, you can always contact me. 
 

Martin V Burrows Jr, 

Oceania Sport Information Centre
osic@onoc.org.fj

Check out this issue on Data Mining and Knowledge Discovery on Sport Analytics 
https://link.springer.com/journal/10618/topicalCollection/AC_8a48e69c8bd06713efbb996a1db86741

Android

Find, lock, or erase a lost android device

If you lose an Android phone, tablet, or Wear Watch, you can find, lock, or erase it. Find my Device is on by default for Android devices associated with a Google account 
https://support.google.com/accounts/answer/6160491?hl=en


Apple

Group Demands Apple Pay Ransom for iCloud Credential


Apple has received a ransom threat from a hacking group claiming to have access to data for up to 800 million iCloud accounts. This is a reminder that Apples are prone to cybersecurity attacks as well. 

http://www.technewsworld.com/story/84406.html

How To Secure Your iPhone In 10 Easy Steps

The name says it all. 

http://www.azraelse
curity.com/blog/how-to-secure-your-iphone-in-10-easy-steps



Cyber Security



Petya virus is something worse than ransomware, new analysis shows

The article is a primer on how dangerous Petya was. It ceased being a ransomeware virus and was later classified as a wiper. Click to learn more. 

https://www.theverge.com/2017/6/28/15887496/petya-virus-not-actually-ransomware-analysis-shows



Ten Ways Evolving Technology Affects Cybersecurity

Rise  in cybercrimes  is consistent with the growth of technology.
http://programs.online.utica.edu/articles/ten-ways-evolving-technology-affects-cybersecurity-0321


How to make your employees care about cybersecurity: 10 tips
Update your employees with the latest security vulnerabilities and train them on how to recognize and avoid them.
http://www.techrepublic.com/article/how-to-make-your-employees-care-about-cybersecurity-10-tips

Scams may follow terrorist atrocities

Scams are perpetrated via unsolicited approaches by email, text, social media post, or by phone. They may be making bogus charity appeals for financial help.
http://www.scoop.it/t/esafety-by-queenanneschool/p/4079864699/2017/06/06/scams-may-follow-terrorist-atrocities

Take Five to Stop Fraud

Take Five: five key things to remember.

https://takefive-stopfraud.org.uk/


Cyber criminals 'could target smart phones in bid to hold

users to ransom


Smart phones, watches, televisions, and fitness trackers could be targeted by

cyber criminals seeking to hold users to ransom over their personal data,


 Cyber Chiefs warn. 

http://www.express.co.uk/life-style/science-technology/778603/cyber-criminals-hack-smart-phones-televisions-ransom-internet-ready-products

Scams may follow terrorist atrocities

Scams are perpetrated via unsolicited approaches by email, text, social media post, or by phone. They may be making bogus charity appeals for financial help.

http://www.scoop.it/t/esafety-by-queenanneschool/p/4079864699/2017/06/06/scams-may-follow-terrorist-atrocities
Take Five to Stop Fraud

Take Five: five key things to remember.

https://takefive-stopfraud.org.uk/
 

Data Encryption

Protect from unauthorized access (British resource site on cybersecurity)
https://www.getsafeonline.org/information-security/data-encryption/
 
Stealing EHRs is better for cybercriminals than stealing credit cards

No-nonsense cyber security: 10 things you

never know were necessary

How can you use common sense to keep you safe online from advanced pieces of malware and cyber criminal masterminds?

https://getsatisfaction.com/hughesnet/topics/no-nonsense-cyber-security-10-things-you-never-know-were-necessary
 

Why Your Phone Is Burning A Privacy Hole

In YourBack Pocket

In modern-day, mobile phones are used for much more than messaging and calling.

But their increasing tools have meant that our personal data is vulnerable

http://blog.getusecure.com/blog/4-ways-phone-leaks-personal-data

 

Google Neutralizes Docs Phishing Scam
A phishing scam that surfaced earlier this week used Google Docs in an attack against at least 1 million Gmail users.
 http://www.technewsworld.com/story/84509.html

Cybersecurity today: Turning positive with new thinking and innovation

How information security is changing on several levels and how modern security teams are now looking at their responsibility in their companies as enabling new business.
https://www.helpnetsecurity.com/2017/03/20/cybersecurity-today/

Recognizing the New Face of Cyber-Security

Threats, risks and dangers related to cyber-security are changing. CIOs must respond with a well-defined strategy and the right mix of processes and tools.
http://www.cioinsight.com/security/recognizing-the-new-face-of-cyber-security.html

Phishing In All Its Forms Is a Menace to Small Businesses
Phishing, SMiShing and Vishing (seriously) are cyberthreats harried business owners need to watch for.
https://www.entrepreneur.com/article/295793

Cyber-security and privacy are top tech challenges for organisations
A majority of large global companies (55 percent) only conduct an IT audit risk assessment on an annual or even less-frequent basis.
https://www.scmagazineuk.com/cyber-security-and-privacy-are-top-tech-challenges-for-organisatio


4 questions businesses should be asking about cybersecurity attacks
Examples of real-world IT questions and how they could be answered.
http://www.techrepublic.com/article/4-questions-businesses-should-be-asking-about-cybersecurity-attacks/
 

Two-factor FAIL : Chap gets pwned after 'AT&T falls for hacker tricks
Time to dump SMS and switch to code-generating apps or tokens

https://www.theregister.co.uk/2017/07/10/att_falls_for_hacker_tricks/
 
It's now 2017, and your Windows PC can still be pwned by a Word file
Microsoft has begun its 2017 with the release of four updates to address security holes in Windows and Office, while Adobe has posted fixes for more than three dozen vulnerabilities in Flash and Reader
https://www.theregister.co.uk/2017/01/10/windows_patch_tuesday/


Email

';--have i been pwned?

Check if your have an email account that has been compromised in data breach.
https://haveibeenpwned.com

Cyber criminals are sharing millions of stolen university email credentials
If you have a .edu e-mail address, beware: The account name, password and other personal information associated with that account may be listed online for cyber criminals to buy.
http://college.usatoday.com/2017/04/25/cyber-criminals-are-sharing-millions-of-stolen-university-email/

Passwords 

Password reuse, credential stuffing and another billion records in Have I been pwned
Because of the nature of the data coming from different places, if you're in there then treat it as a reminder that your data is out there circulating around and that you need to go and get yourself a password manger and create strong, unique passwords
 https://www.troyhunt.com/password-reuse-credential-stuffing-and-another-1-billion-records-in-have-i-been-pwned/
 
Password guidance summary: how to protect against password-guessing attacks
How organisations and individuals can protect themselves from password-guessing attacks.
v.uk/guidance/password-guidance-summary-how-protect-against-password-guessing-attacks

How OneLogin Was Compromised and the Lessons for the Rest of Us
As painful as breach incidents are for the service provider and affected companies, they also offer a teaching moment.
https://www.entrepreneur.com/article/295831


Sports
Protecting Athletic Venues from Cyber Threats
Entryways and exits, concourses and corridors, seating areas overlooking major security threats. 
http://www.athleticbusiness.com/stadium-arena-security/protecting-athletic-venues-from-cyber-threats.html
 

IAAF Statement - Release of Information Following Cyber Attack

 So it’s real here. You can’t afford to ignore cybersecurity (This does happen is sports)
https://www.iaaf.org/news/press-release/iaaf-statement-release-of-information-followi

Sports Threat Intelligence-Sharing Group Formed
USA based group that shares breaches and hacks that happen in the sports community. 
https://sports-isao.org/site/



Have a good Weekend!!!

 

 

Group Demands Apple Pay Ransom for iCloud Credentials

Group Demands Apple Pay Ransom for iCloud Credentials

 

Group Demands Apple Pay Ransom for iCloud Credentials

Group Demands Apple Pay Ransom for iCloud Credentials

 




 


 

 

 













 
     

Oceania Sport Information Centre (OSIC)

OSIC is the regional sports information centre that's headquartered at The University of the South Pacific and funded by the  Oceania National Olympic Committees.
     

UPCOMING  EVENTS
International Cycling Conference,
19-21 September 2017, Mannheim (Germany)
XVIII International Conference of Walking and Liveable Communities,
20-22 September 2017, University of Calgary (Canada)
International Conference on Sports Engineering,
23-25 October 2017, Jaipur (India)
2017 ASICS Sports Medicine Australia Conference
25 - 28 October 2017 (Malaysia)
19th International Conference on Sport Science, Rugby Games and Drills
23-24 October 2017 London (England)

Follow on Twitter
Friend on Facebook
Follow on Instagram
Website
Email
YouTube
Copyright © 2017 Oceania Sport Information Centre, All rights reserved.


Our mailing address is:
Oceania Sport Information Centre
USP Library, Level A
The University of the South Pacific, Private Mail Bag, The Laucala Campus
Suva
Fiji

Add us to your address book


Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list

Email Marketing Powered by Mailchimp