Application security, Mobile, Privacy protection, Security
September 20, 2019
Via: Security WeekThe review was launched in 2018 after revelations that the political consultancy hijacked personal data on millions of Facebook users and included attorneys, external investigators, data scientists, engineers, policy specialists and others, according to a Facebook statement. The suspensions are […]
Access control, Network security, Security
August 28, 2019
Via: Help Net SecurityAccording to a survey of 476 IT security professionals at Black Hat USA 2019, nearly one in four (24%) said they would take company information to help apply for a position at a competitor. The Gurucul study also found that […]
July 15, 2019
Via: Help Net SecurityHealthcare organizations have high levels of confidence in their cybersecurity preparedness despite most of them using only basic user authentication methods in the face of an increasing number of patient identity theft and fraud instances in the marketplace, according to […]
Network security, Privacy protection
March 25, 2019
Via: Security WeekThe Federal Emergency Management Agency wrongly released to a contractor the personal information of 2.3 million survivors of devastating 2017 hurricanes and wildfires, potentially exposing the victims to identity fraud and theft, a government watchdog reported Friday. The Homeland Security […]
December 4, 2017
Via: Security WeekA member of the US National Security Agency’s elite hacking team has been charged with illegally removing top secret materials, in an embarrassing breach for the crucial electronic espionage body. The Justice Department said Friday that Nghia Hoang Pho, 67, […]
November 22, 2017
Via: Dark ReadingResearcher at Black Hat Europe will show how Samsung Pay’s security falls short and ways attackers could potentially bypass it. Mobile users installing Samsung Pay on their devices could have sensitive information stolen by attackers due to a newly discovered […]
October 4, 2016
Via: Help Net SecurityDigital disruptors such as algorithms, artificial intelligence (AI), bots and chatbots are already transforming businesses. Gartner expects that algorithmic business will create even greater levels of disruption and new industries. To support the new capabilities and business models of digital […]
September 15, 2016
Via: Help Net SecurityA new Enterprise Strategy Group (ESG) research study, which was completed by 200 senior IT and security professionals with influence over purchasing decisions, highlights the need for organizations to have the necessary technologies in place to ensure policies travel with […]
September 15, 2016
Via: Dark ReadingAs a collective information security group, we know that we need teamwork, but it often feels like we aren’t a single team rowing together. We have a common cause. We preach working together with IT and the business to achieve security goals. But we […]
July 28, 2016
Via: Dark ReadingCatholic Health Care Services of the Archdiocese of Philadelphia agrees to pay $650,000 fine over 2014 data breach. Organizations that provide services to entities handling personal health information and health records—like doctors offices and hospitals—for some time now have been […]
June 22, 2016
Via: SC MagazineThe Vermont Fish & Wildlife Department reported that data of those purchasing hunting or fishing licenses may have been compromised on two separate occasions. How many victims? Roughly 120,000 people were possibly affected however, only seven may have had partial credit […]
May 19, 2016
Via: Security WeekMicrosoft CEO Satya Nadella’s transformation of the company from a staid desktop sales company into a dynamic cloud subscription company has been remarkable. By the number of enterprise users, Microsoft has become the most widely used cloud service provider in […]
May 13, 2016
Via: Dark ReadingOn-server storage and processing of biometric authentication presents a host of regulatory and corporate responsibility issues. It’s bad enough when an organization exposes huge repositories of customer records and login information through large-scale data breaches. But the ante for pain […]
April 1, 2016
Via: Help Net SecurityTwo of the most prestigious law firms in the US who are best known for their financial services and corporate practices have had their computer networks compromised by hackers. According to the WSJ, the FBI is investigation breaches at Cravath […]
March 31, 2016
Via: The HillSpeaker Paul Ryan (R-Wis.) wants the Internal Revenue Service to immediately start working to adopt a watchdog’s recommendations to improve the security of taxpayer information. The Government Accountability Office issued a report earlier this week that recommended 43 actions the […]
February 29, 2016
Via: CSO OnlineAlmost a year later, it seems that the University of California Berkeley has been breached yet again. In September of 2014 the school’s Real Estate division was the victim of a digital interloper who compromised their systems. But, I was […]
January 26, 2016
Via: SC MagazineThe University of Virginia (UVA) suffered a data breach that was initiated via a phishing scam that revealed the tax and banking data of some of the school’s employees. How many victims? 1,400 What type of information? W-2 tax forms […]
October 7, 2015
Via: cyber-crimeThe Counter Threat Unit (CTU), the Dell SecureWorks research team, uncovered an initiative by an Iran-based threat group it dubbed #threat group 2889, to create a network of fake #linkedin profiles for “obtaining confidential #information they can use for cyber […]
September 28, 2015
Via: hacker#intelligence leaders are worried that the next front in malicious cyber activity will be efforts to deliberately manipulate data, altering a hacked system in such a way that users will unwittingly rely on false #information. It’s the kind of hack […]
September 18, 2015
Via: malwareResearchers from anti-virus firm #dr.web have discovered #new malware designed to infect point-of-sale (#pos) terminals and capable of intercepting GET and POST requests sent from Web browsers on infected machines. Dubbed Trojan.MWZLesson, the Trojan can modify the registry branch in […]