Browsing Category: Social Engineering

[img_assist|nid=1829|title=|desc=|link=none|align=right|width=115|height=115]An email which purports to
relate to a recent Apple retail transaction and asks for details of any
recent orders is out there. The email also carries a stuffed file.
This contains an ‘exe’ file which will only launch on a Windows machine. The email reads: “We recorded a payment request from ‘Apple Inc.’ to
enable the charge of $7,548.45 on your account.” Read the full article. [9to5Mac]

Read more...

[img_assist|nid=1831|title=|desc=|link=none|align=left|width=115|height=115]Technologists already are worried about the security implications of linking nearly all elements of the U.S. power grid to the public Internet. Now, privacy experts are warning that the so-called “smart grid” efforts could usher in a new class of concerns, as utilities begin collecting more granular data about consumers’ daily power consumption. Read the full article. [Washington Post]

Read more...

[img_assist|nid=1819|title=|desc=|link=none|align=left|width=115|height=115]MassMutual officials this week confirmed that one of its employee
databases was accessed by an unauthorized person or persons, exposing
an unknown number of employees’ personal data for a
yet-to-be-determined amount of time. The Springfield, Mass.-based insurer said the compromised
database was being maintained by an unidentified, third-party vendor
and contained “a limited amount of personal employee data.” Read the full article. [internetnews.com]

Read more...

[img_assist|nid=1802|title=|desc=|link=none|align=right|width=115|height=115]Connecticut Attorney General Richard
Blumenthal is investigating Blue Cross Blue Shield’s loss of
confidential information, including tax identification and Social
Security numbers, for 800,000 healthcare providers nationwide. The attorney general is also seeking additional identity theft
protection for affected doctors, therapists, and other professionals,
according to a statement from the attorney general issued. The companies lost the information when a laptop was stolen Aug. 25. Read the full article. [Dark Reading]

Read more...

[img_assist|nid=1790|title=|desc=|link=none|align=right|width=115|height=115]They’re the Internet equivalent of storm chasers, spending endless hours scanning and sleuthing, looking for the telltale signs of botnets. Here’s an inside look at the battle against cybercrime’s weapons of mass infection. Read the full article. [CSOonline.com]

Read more...

[img_assist|nid=1788|title=|desc=|link=none|align=right|width=115|height=115]Hackers are increasingly targeting law firms and public relations
companies with a sophisticated e-mail scheme that breaks into their
computer networks to steal sensitive data, often linked to large
corporate clients doing business overseas. Read the full article. [NYTimes.com/AP]

Read more...

[img_assist|nid=1776|title=|desc=|link=none|align=left|width=115|height=115]The recent ACM Cloud Computing Security Workshop in Chicago was devoted specifically to cloud security. Speakers included Whitfield Diffie, a cryptographer and security
researcher who, in 1976, helped solve a fundamental problem of
cryptography: how to securely pass along the “keys” that unlock
encrypted material for intended recipients. Diffie, now a visiting professor at Royal Holloway, University of
London, was until recently a chief security officer at Sun
Microsystems. He sat down with Technology Review’s chief
correspondent. Read the full article. [Technology Review]

Read more...

[img_assist|nid=1775|title=|desc=|link=none|align=right|width=175|height=88]A hacker has broken into the Nebraska Worker’s Compensation database,
prompting an FBI investigation and an effort to contact those who may
be affected. Several thousand people could be affected by the
breach, which was discovered last week when the state’s chief
information officer noticed an unusual amount of Internet traffic
traversing the Worker’s Compensation courts server. Read the full article. [KETV.com]

Read more...

[img_assist|nid=1663|title=|desc=|link=none|align=right|width=115|height=115]A well known commercial provider of spyware applications for numerous mobile platforms, has recently ported its Mobile Spy app to the Android mobile OS. Just like previous releases of the application, the Android version
keeps a detailed log of GPS locations, calls, visited URLs, and
incoming/outgoing SMS messages, available at the disposal of the
attacker who installed it manually by obtaining physical access to the
targeted device. Read the full article. [ZDNet]

Read more...

A federal cybersecurity law edged closer to reality late last week when the Senate Judiciary Committee approved a bill to protect the personal data of Americans. The bill is a bipartisan effort sponsored by Chairman Patrick Leahy, D-Vt., and co-sponsored by former Chairman Orrin Hatch, R-Utah, that would, among other things, force companies and data brokers to institute data privacy and security programs. Some technology professionals surveyed don’t think the Federal law will do much to help. Read the full article. [CSOonline.com] 

Read more...