Trending Security Topics
Cybersecurity Awareness Basics
How to avoid identity theft, frauds, scams and more. Click below for more information.
Social media sites, such as Snapchat, Facebook, Twitter, Instagram, and LinkedIn, are amazing resources, allowing you to meet, interact, and share with people around the world. However, with all this power comes risks--not just for you, but your family, friends, and employer. In this newsletter, we cover the key steps to making the most of social media securely and safely.
From “SANS OUCH!” (3/07/2018)
This law requires all financial institution employees to be mandated reporters. It is a crime when a mandated reporter knowingly and willingly fails to report a case of suspected disabled adult or elder person abuse.
From “Financial Institutions Today” Department of Banking and Finance (2/01/2018)
"While intrusive and annoying ads make for a poor browsing experience, I think the most nefarious aspects of the online advertising industry are those not necessarily visible to the naked eye," says Jerome Segura, lead malware intelligence analyst at security firm Malwarebytes. "Trackers, forced redirections and malvertising in general are issues that can have far more impact on users and need to be addressed as well."
From “Bank Info Security” Jeremy Kirk (2/20/2018)
It's long been known that you should never insert an unknown USB drive to your computer because it could be loaded with malware. However, new research from Ben-Gurion University has exposed 29 types of USB attacks, and extends to your smartphone. It shows that you should never use a USB charger you find lying around or plug into a public USB port. Both can be compromised by attackers, as we talked about with one of the researchers on the project, Ran Yahalom.
From “Tech Republic” Jason Hiner (3/08/2018)
It might seem painfully obvious that server access should be properly protected with hardened credentials, but unfortunately that's not always the case.
From “eSecurity Planet” Sean Michael Kerner (2/28/2018)
Cybercrime costs businesses close to $600 billion, or 0.8 percent of global GDP, which is up from a 2014 study that put global losses at about $445 billion, according to a report by McAfee, in partnership with the Center for Strategic and International Studies (CSIS)… The report attributes the growth over three years to cybercriminals quickly adopting new technologies, the ease of engaging in cybercrime – including an expanding number of cybercrime centers – and the growing financial sophistication of top-tier cybercriminals.
From “Help Net Security” (2/23/2018)
The Federal Trade Commission (FTC) has issued guidance to consumers considering using a Virtual Private Network (VPN) for their mobile phones. Some mobile phone users choose to use VPNs to shield the information on their phones when using public Wi-Fi networks.
From “US-CERT” (2/22/2018)
Security breaches at companies like Equifax, Target and Yahoo over the past few years have exposed the personal information of millions of consumers. The federal government isn’t immune to hackers, either. The systems of the Office of Personnel Management and even the S.E.C. have been breached. The response from companies usually seems to be about keeping a lid on the hack. That’s something the S.E.C. would like to end, but its guidance may not go very far in changing how companies deal with cybersecurity issues.
From “The New York Times” Peter J. Henning (3/05/2018)
The decision to introduce a new smart device into your home should come only after you’ve answered these two questions affirmatively: “Will the device improve the quality of my life/fill a need I have?” and “Am I satisfied with the level of security and privacy the manufacturer provides to users?”
From “Help Net Security” Zeljka Zorz (2/27/2018)
A recent consumer survey suggests that half of all Americans still haven’t checked their credit report since the Equifax breach last year exposed the Social Security numbers, dates of birth, addresses and other personal information on nearly 150 million people. If you’re in that fifty percent, please make an effort to remedy that soon.
From “Krebs on Security” Brian Krebs (3/11/2018)
Just as with the Equifax breach, it is conceivable that someone could buy an executive’s social security number, salary for the past five years, tax returns, home address and the make and model of the last car they purchased for a couple hundred dollars. Researchers have found that criminals are creating central databases on the Dark Web that aggregate profiles around specific individuals.
From “Info Security” Kevin O’Brien (2/26/2018)
Though constant efforts are carried out to minimize cyber dangers and more money is being devoted to preventing attacks, hackers continue to gain strength. As more and more people do business online, it remains ever-so crucial to protect yourself and your company from these growing risks.
From “The Commentator” Sarah Torgueman 3/11/2018
"Security experts and law enforcement officials warn that card skimming is present in many communities," said Michael Benardo, manager of the FDIC's Cyber Fraud and Financial Crimes Section. "With the information that can be skimmed, a thief can go on an online shopping spree or sell that valuable data to other con artists."
From “FDIC Consumer News – Winter 2018” (3/05/2018)
Ransomware is the 21st century's answer to extortion and the number of cyberattacks involving the malicious software is surging, according to the chief executive of McAfee.
From “CNBC” Ryan Browne and Jon Fortt (2/27/2018)
Two security researchers have discovered one of Mazda's models saves personal data from smartphones connected to the automaker's infotainment system—and they were able to retrieve it, too.
From “Car Buzz” Mark Stevenson (3/11/2018)
Smart Eye: Kaspersky Lab Discovers Severe Flaws That Could Transform Smart Cameras Into Surveillance Tool
The interesting thing is that besides the previously described attack vectors such as malware infections and botnets, we found that the cameras could also be used for mining. While mining is becoming one of the main security threats facing businesses, IoT mining is an emerging trend due to the growing prevalence of IoT devices and will continue to increase.
From “Business Wire” Jessica Bettencourt (3/12/2018)
January 2018 brought us a whole new type of threat with the Meltdown and Spectre bugs. Suddenly, the scope of hardware vulnerabilities was front and center. However, amid the media frenzy, we should move forward with a reasonable sense of what to anticipate the rest of this year, to best defend our organizations and their sensitive data – which now resides in the cloud, in on-premises data centers, and in hybrid computing environments. With this in mind, here are six cybersecurity trends to watch for the rest of the year:
From “Dark Reading” Misha Govshteyn (2/26/2018)