Department of Homeland Security Warns of Cyber-Attacks by Iran -
The Department of Homeland Security (DHS) issued a grave warning to U.S. businesses and critical infrastructure operators on January 6, 2020, alerting the...more
1/10/2020
/ Assassinations ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Drones ,
Federal Aviation Administration (FAA) ,
Financial Services Industry ,
Foreign Relations ,
Hackers ,
Information Sharing ,
Iran ,
Microsoft ,
NYDFS ,
Operating System Developers ,
Personally Identifiable Information ,
Risk Management ,
Risk Mitigation ,
Unmanned Aircraft Systems ,
Vulnerability Assessments
After the killing of Qassem Soleimani on January 3, 2020, by the U.S. government, the cybersecurity news industry has been abuzz about whether Iran will engage in cyber terrorism, and if so, to what degree, as part of its...more
1/10/2020
/ Assassinations ,
Computer Servers ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Databases ,
Email ,
Email Policies ,
Hackers ,
Infrastructure ,
Iran ,
Microsoft ,
Operating System Developers ,
Phishing Scams ,
Popular ,
Risk Management ,
Risk Mitigation ,
Terrorist Threats ,
Vulnerability Assessments
Security research firm Gigamon has reported that the nasty cybercriminal group FIN8 may have reappeared in June after a two-year silence. FIN8 is known for implementing malware on point of sale systems to steal credit card...more
7/29/2019
/ Credit Cards ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Drones ,
Email ,
Hackers ,
Health Care Providers ,
Iran ,
Malware ,
Microsoft ,
Personally Identifiable Information ,
Phishing Scams ,
Popular ,
UPS
As reported yesterday by Help Net Security, hackers are targeting Microsoft Office365 administrators in a new phishing campaign that can obtain and confirm credentials in real time. According to the article the attack begins...more
The headlines of hacking incidents against counties, cities and towns are racking up like the retail space was several years ago. The hackers have targeted state and municipalities to wreak their havoc. This week, Orange...more
4/1/2019
/ Authentication ,
Connected Items ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Drones ,
Federal Aviation Administration (FAA) ,
Federal Trade Commission (FTC) ,
Hackers ,
Internet of Things ,
Popular ,
Ransomware ,
Smart Devices
I came across an article last week that indicated there was a successful attack on Microsoft’s Office 365 and Google’s G Suite environments that was able to bypass multi-factor authentication (MFA). However, after reading the...more
Mozilla recently announced that it is adding a new security feature to its Firefox Quantum web browser that will alert users when they visit a website that has reported a data breach in the last 12 months.
...more
11/26/2018
/ Black Friday ,
Data Breach ,
Drones ,
Federal Aviation Administration (FAA) ,
Mozilla ,
OIG ,
Part 107 ,
Record Retention ,
Retailers ,
Waivers ,
Websites
Security researchers at Radboud University in the Netherlands have discovered a flaw in several manufacturers’ solid state hard drive firmware that can be exploited to read data from self-encrypting drives (SED)....more
A new ransomware, dubbed “Ryuk,” has surfaced in the last few weeks and is said to be targeting large organizations in the United States. The attackers behind Ryuk have reportedly made more than $640,000 in just two weeks,...more
8/27/2018
/ Airspace ,
Banking Sector ,
Biometric Information ,
Biometric Information Privacy Act ,
Cell Phones ,
Commercial Use ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Protection ,
Drones ,
Employee Privacy Rights ,
Employer Liability Issues ,
Employment Litigation ,
Hackers ,
National Security ,
Popular ,
Ransomware ,
Risk Management ,
State and Local Government ,
State Departments of Transportation ,
Unmanned Aircraft Systems
CYBERSECURITY -
Ticketmaster Hit With Malware Compromising UK Customers’ Data -
Ticketmaster has reported that it has “identified malicious software on a customer support product hosted by Inbenta Technologies, an...more
7/6/2018
/ Consumer Privacy Rights ,
Cyber Attacks ,
Data Breach ,
Data Collection ,
Entertainment Industry ,
Event Tickets ,
Hackers ,
Malware ,
New Legislation ,
Personal Data ,
Personally Identifiable Information ,
Scams ,
State and Local Government ,
State Data Breach Notification Statutes ,
Tax Preparers ,
TIAA CREF ,
Vacation Rentals
By now most smartphone users are aware of location tracking used by both Apple and Android operating systems. Basic location tracking is a system which uses GPS data to know the phone user’s location. However, according to...more
The Federal Communications Commission’s (FCC) potential reversal of the Obama Administration’s ‘Net Neutrality’ rules have been a constant headline lately. Most media coverage goes to the core principals of net neutrality,...more
Considering the recent Equifax data breach which put an estimated 145.5 million American’s identity at risk, main stream media outlets are starting to ask an important question; if we can’t stop data breaches, how do we...more
By Executive Order, the Trump Administration recently reversed an Obama Administration order aimed at protecting consumer’s personal information from use by their Internet Service Provider (ISP). ISPrior to the Trump’s EO,...more
Many firms have strict international travel policies in relation to the use of technology. These policies tend to be more skewed towards countries with greater state control over communications networks and specifically the...more
IT professionals have long understood the importance of changing the default password for network connected hardware devices (printers, switches, wireless access points, etc.). In the world of the Internet Of Things it seems...more
It is said that a chain is only as strong as its weakest link. Often the same is said for an organization’s data privacy & security defensives. Could it be that the ubiquitous ATM machine is the weak link to the banking...more
Due to recent high profile data breaches users have a heightened awareness of security and how they manage or don’t manage their various account credentials. People are beginning to pay more attention to the advice given to...more
Every morning we sit down at our computers and provide our credentials to the network; user name and password. It has become such a ubiquitous part of modern life, we have a user name and password to everything, we even have...more
Traditionally it was very common for organizations to adopt an optimistic security model. Give everyone access to everything unless specifically denied access to sensitive areas, like HR or Finance. While this approach is...more
With the release of Android 6.0, code name Marshmallow, Google has mandated that OEMs (Original Equipment Manufacturers) enable full disk encryption. Google is requiring that the feature be enabled as part of the ‘out of box...more
10/27/2015
/ Android ,
Cell Phones ,
Data Privacy ,
Data Security ,
Encryption ,
Google ,
iPhone ,
Mobile Devices ,
OEM ,
Popular ,
Smartphones ,
Wireless Devices ,
Wireless Industry ,
Wireless Technology
Encryption is a basic term used to describe the act of encoding data, files, and digital communications such that only those with the cipher could read or understand the information. Think back to the decoder ring you got in...more
8/17/2015
/ Data Privacy ,
Data Security ,
Data Transfer Providers ,
Digital Communications ,
Dropbox ,
Email ,
Encryption ,
File Sharing ,
Google ,
Laptop Computers ,
Privacy Policy
With the uptick in high profile security breaches like the Office of Personnel Management, Target, JPMorgan and others, it is easy to become desensitized to the constant risk our cyber lives pose both personally and...more