Browsing Category: Data Breaches

[img_assist|nid=1842|title=|desc=|link=none|align=left|width=115|height=115]It’s not a very good day when a security report concludes: Disruptive cyber activities expected to become the norm in future political and military conflicts. But such was the case as the Government Accountability Office took yet another critical look at the US federal security systems and found most of them lacking. Read the full article.

Read more...

[img_assist|nid=1837|title=|desc=|link=none|align=right|width=115|height=115]Authorities in the U.K. have arrested two people in connection with using a notorious Trojan in a scheme to steal online banking information. The man and the woman, both 20, were arrested by the Metropolitan Police Service in Manchester, according to police. The duo is accused of using the Zeus Trojan, also known as Zbot, in a plot to steal information. It is believed the Trojan was configured to record victim’s online bank account information and passwords, as well as credit card numbers and other information. Read the full article. [eWEEK]

Read more...

Categories: Data Breaches, Government

[img_assist|nid=713|title=|desc=|link=none|align=left|width=115|height=115]As an analyst, and now as a consultant, I raise issues of digital
and physical security: let’s talk about them, in plain terms, and
collectively move to do something. As a member of the security
digerati, I think we should be helping people, and we have to either
step up with a better way forward, or get the hell out of the way.

Read more...

[img_assist|nid=1830|title=|desc=|link=none|align=left|width=115|height=115]Computer systems with proper security and network controls should be able to withstand about 80 percent of known cyberattacks, according to a senior National Security Agency official. Richard Schaeffer Jr., the NSA’s information assurance director, told the Senate Judiciary Committee’s Terrorism and Homeland Security Subcommittee that three measures in particular are especially effective: “Best practices, proper configurations [and] good network monitoring.” Read the full article. [Government Computer News]

Read more...

[img_assist|nid=1819|title=|desc=|link=none|align=left|width=115|height=115]MassMutual officials this week confirmed that one of its employee
databases was accessed by an unauthorized person or persons, exposing
an unknown number of employees’ personal data for a
yet-to-be-determined amount of time. The Springfield, Mass.-based insurer said the compromised
database was being maintained by an unidentified, third-party vendor
and contained “a limited amount of personal employee data.” Read the full article. [internetnews.com]

Read more...

[img_assist|nid=1812|title=|desc=|link=none|align=left|width=115|height=115]Security researchers have detected a massive blackhat SEO (search engine optimization) campaign consisting of over 200,000 compromised web sites, all redirecting to fake security software (Inst_58s6.exe), commonly referred to as scareware. The massive blackat SEO campaign has been launched by the same people who operate/or manage the campaigns for the Koobface botnet. Read the full article. [ZDNet]

Read more...

[img_assist|nid=1804|title=|desc=|link=none|align=right|width=115|height=115]Windows users running 64-bit versions of the
operating system are less likely to get infected by attack code,
Microsoft’s security team said yesterday. But that doesn’t mean they won’t, countered an outside security researcher. “There’s a lot of 64-bit malware,” said security researcher Alfred Huger. “They can run their code
in compatibility mode, or they can compile it for 64-bit. The reason
they’re not is that there’s still not a lot of 64-bit deployment.
There’s 64-bit malware out there, just like there’s Mac OS malware out
there. But right now, [64-bit] is just not as opportune a target as
32-bit.” Read the full article. [Computerworld]

Read more...

[img_assist|nid=1802|title=|desc=|link=none|align=right|width=115|height=115]Connecticut Attorney General Richard
Blumenthal is investigating Blue Cross Blue Shield’s loss of
confidential information, including tax identification and Social
Security numbers, for 800,000 healthcare providers nationwide. The attorney general is also seeking additional identity theft
protection for affected doctors, therapists, and other professionals,
according to a statement from the attorney general issued. The companies lost the information when a laptop was stolen Aug. 25. Read the full article. [Dark Reading]

Read more...

[img_assist|nid=1805|title=|desc=|link=none|align=right|width=115|height=115]The Serious Organised Crime Agency (Soca) says websites are currently being used to recruit “money mules”. The “mules” are ordinary people who send and receive payments through their bank accounts to facilitate business. But in reality, the cash has been laundered from crime, leaving unwitting mules open to prosecution. Fraudsters are using a variety of bogus and legitimate recruitment channels to con job-hunters into thinking they have found genuine employment. Read the full article. [BBC]

Read more...

[img_assist|nid=1790|title=|desc=|link=none|align=right|width=115|height=115]They’re the Internet equivalent of storm chasers, spending endless hours scanning and sleuthing, looking for the telltale signs of botnets. Here’s an inside look at the battle against cybercrime’s weapons of mass infection. Read the full article. [CSOonline.com]

Read more...