Browsing Category: Social Engineering

[img_assist|nid=1830|title=|desc=|link=none|align=left|width=115|height=115]Computer systems with proper security and network controls should be able to withstand about 80 percent of known cyberattacks, according to a senior National Security Agency official. Richard Schaeffer Jr., the NSA’s information assurance director, told the Senate Judiciary Committee’s Terrorism and Homeland Security Subcommittee that three measures in particular are especially effective: “Best practices, proper configurations [and] good network monitoring.” Read the full article. [Government Computer News]

Read more...

[img_assist|nid=1829|title=|desc=|link=none|align=right|width=115|height=115]An email which purports to
relate to a recent Apple retail transaction and asks for details of any
recent orders is out there. The email also carries a stuffed file.
This contains an ‘exe’ file which will only launch on a Windows machine. The email reads: “We recorded a payment request from ‘Apple Inc.’ to
enable the charge of $7,548.45 on your account.” Read the full article. [9to5Mac]

Read more...

[img_assist|nid=1831|title=|desc=|link=none|align=left|width=115|height=115]Technologists already are worried about the security implications of linking nearly all elements of the U.S. power grid to the public Internet. Now, privacy experts are warning that the so-called “smart grid” efforts could usher in a new class of concerns, as utilities begin collecting more granular data about consumers’ daily power consumption. Read the full article. [Washington Post]

Read more...

[img_assist|nid=1819|title=|desc=|link=none|align=left|width=115|height=115]MassMutual officials this week confirmed that one of its employee
databases was accessed by an unauthorized person or persons, exposing
an unknown number of employees’ personal data for a
yet-to-be-determined amount of time. The Springfield, Mass.-based insurer said the compromised
database was being maintained by an unidentified, third-party vendor
and contained “a limited amount of personal employee data.” Read the full article. [internetnews.com]

Read more...

[img_assist|nid=1802|title=|desc=|link=none|align=right|width=115|height=115]Connecticut Attorney General Richard
Blumenthal is investigating Blue Cross Blue Shield’s loss of
confidential information, including tax identification and Social
Security numbers, for 800,000 healthcare providers nationwide. The attorney general is also seeking additional identity theft
protection for affected doctors, therapists, and other professionals,
according to a statement from the attorney general issued. The companies lost the information when a laptop was stolen Aug. 25. Read the full article. [Dark Reading]

Read more...

[img_assist|nid=1790|title=|desc=|link=none|align=right|width=115|height=115]They’re the Internet equivalent of storm chasers, spending endless hours scanning and sleuthing, looking for the telltale signs of botnets. Here’s an inside look at the battle against cybercrime’s weapons of mass infection. Read the full article. [CSOonline.com]

Read more...

[img_assist|nid=1788|title=|desc=|link=none|align=right|width=115|height=115]Hackers are increasingly targeting law firms and public relations
companies with a sophisticated e-mail scheme that breaks into their
computer networks to steal sensitive data, often linked to large
corporate clients doing business overseas. Read the full article. [NYTimes.com/AP]

Read more...

[img_assist|nid=1776|title=|desc=|link=none|align=left|width=115|height=115]The recent ACM Cloud Computing Security Workshop in Chicago was devoted specifically to cloud security. Speakers included Whitfield Diffie, a cryptographer and security
researcher who, in 1976, helped solve a fundamental problem of
cryptography: how to securely pass along the “keys” that unlock
encrypted material for intended recipients. Diffie, now a visiting professor at Royal Holloway, University of
London, was until recently a chief security officer at Sun
Microsystems. He sat down with Technology Review’s chief
correspondent. Read the full article. [Technology Review]

Read more...

[img_assist|nid=1775|title=|desc=|link=none|align=right|width=175|height=88]A hacker has broken into the Nebraska Worker’s Compensation database,
prompting an FBI investigation and an effort to contact those who may
be affected. Several thousand people could be affected by the
breach, which was discovered last week when the state’s chief
information officer noticed an unusual amount of Internet traffic
traversing the Worker’s Compensation courts server. Read the full article. [KETV.com]

Read more...

[img_assist|nid=1663|title=|desc=|link=none|align=right|width=115|height=115]A well known commercial provider of spyware applications for numerous mobile platforms, has recently ported its Mobile Spy app to the Android mobile OS. Just like previous releases of the application, the Android version
keeps a detailed log of GPS locations, calls, visited URLs, and
incoming/outgoing SMS messages, available at the disposal of the
attacker who installed it manually by obtaining physical access to the
targeted device. Read the full article. [ZDNet]

Read more...