The latest count from the Identity Theft Resource Center (ITRC) reports that there has been a total of 269 data breaches recorded through April 19, 2016, and that more than 11.27 million records have been exposed since the beginning of the year. The total number of reported breaches increased by 22 compared to the prior week.
What could be worse than a ransomware infection? How about getting infected by crypto-ransomware that taunts you by slowly deleting your encrypted files while increasing the ransom demand until you pay for the decryption key? And don’t reboot your PC, or else the ransomware will delete 1,000 files at once as a reprisal.Continue Reading…
In today’s world, there’s really only two types of companies or two types of people which are those who have been hacked and realize it and those who have been hacked and haven’t.” That’s what mobile security expert John Hering tells 60 Minutes correspondent Sharyn Alfonsi about the danger of cellphone hacking on this week’s broadcast.
Authorities are investigating a data breach at the Catholic Archdiocese of Denver that put current and terminated employees and their dependents, spouses and beneficiaries at risk of ID theft.
Some apps generate an enormous amount of spam and can annoy the heck out of your Facebook friends. Others are outright scams and should be avoided entirely. For example, any application offering to show you who has viewed your profile, who your Facebook stalkers are etc., are guaranteed to be fraudulent. Facebook doesn’t allow developers access to the data required to create apps like this.
The U.S. Department of Homeland Security has sent out an urgent alert telling Windows customers to uninstall Apple’s QuickTime program. Apple has pulled support for QuickTime on Windows, the video and audio software that had once been widely used to play movie trailers and other Internet media clips. The company decided this week not to issue any more security updates for QuickTime on Windows, despite two major vulnerabilities in the software that can allow hackers into people’s computers.
In today’s world, most organizations, regardless of size, will experience a security incident in the form of social engineering, a data breach, or malware. Social engineering attacks will continue to be the easiest way for cyber criminals to compromise corporate networks. With social engineering, the attacker can mass engineer an attack with the knowledge that one user can compromise an entire network.
The American College of Cardiology has notified 1,400 institutions some patient data may have been compromised after the data was inadvertently made available to a third party vendor.
If you use an Apple iPhone, iPad or other iDevice, now would be an excellent time to ensure that the machine is running the latest version of Apple’s mobile operating system —version 9.3.1. According to researcher Zach Straley, resetting your device’s internal calendar to Jan. 1, 1970 is almost guaranteed to completely and permanently brick your device. It’s a strange glitch, but one that was determined by security researchers to have the potential to be automated and used against people to destroy their devices. What can you do to keep your Apple device safe?