In today’s world, there’s really only two types of companies or two types of people which are those who have been hacked and realize it and those who have been hacked and haven’t.” That’s what mobile security expert John Hering tells 60 Minutes correspondent Sharyn Alfonsi about the danger of cellphone hacking on this week’s broadcast.
Authorities are investigating a data breach at the Catholic Archdiocese of Denver that put current and terminated employees and their dependents, spouses and beneficiaries at risk of ID theft.
Some apps generate an enormous amount of spam and can annoy the heck out of your Facebook friends. Others are outright scams and should be avoided entirely. For example, any application offering to show you who has viewed your profile, who your Facebook stalkers are etc., are guaranteed to be fraudulent. Facebook doesn’t allow developers access to the data required to create apps like this.
The U.S. Department of Homeland Security has sent out an urgent alert telling Windows customers to uninstall Apple’s QuickTime program. Apple has pulled support for QuickTime on Windows, the video and audio software that had once been widely used to play movie trailers and other Internet media clips. The company decided this week not to issue any more security updates for QuickTime on Windows, despite two major vulnerabilities in the software that can allow hackers into people’s computers.
In today’s world, most organizations, regardless of size, will experience a security incident in the form of social engineering, a data breach, or malware. Social engineering attacks will continue to be the easiest way for cyber criminals to compromise corporate networks. With social engineering, the attacker can mass engineer an attack with the knowledge that one user can compromise an entire network.
The American College of Cardiology has notified 1,400 institutions some patient data may have been compromised after the data was inadvertently made available to a third party vendor.
If you use an Apple iPhone, iPad or other iDevice, now would be an excellent time to ensure that the machine is running the latest version of Apple’s mobile operating system —version 9.3.1. According to researcher Zach Straley, resetting your device’s internal calendar to Jan. 1, 1970 is almost guaranteed to completely and permanently brick your device. It’s a strange glitch, but one that was determined by security researchers to have the potential to be automated and used against people to destroy their devices. What can you do to keep your Apple device safe?
The breach occurred in February and was outlined in an internal FDIC memorandum obtained by The Washington Post. The March 18 memo from Lawrence Gross Jr., FDIC’s chief information officer and chief privacy officer, to FDIC Chairman Martin J. Gruenberg said the data were downloaded to a personal storage device “inadvertently and without malicious intent.”
Hacking services are increasingly being offered in a booming Dark Web, according to Dell SecureWorks’s annual report that examined current and emerging trends in the underground hacker marketplace. The cyber security company’s third annual Underground Hacker Markets Report says, hackers are increasingly operating as regular businesses with many advertising themselves as “honest, trustworthy and professional,” and offering a variety of illicit goods and services on the cheap.