Researchers in Israel were able to steal data from a computer that was disconnected from the Internet and sitting by itself in another room. Here’s why the hack and others like it matter for the safety of cars, power plants, and financial networks.
On Tuesday, President Barack Obama unveiled a new cybersecurity “national action plan” calling for an overhaul of aging government networks and a high-level commission to boost security awareness. This move comes in response to epidemic of data breaches and cyber attacks on government, private networks.
Over the past several years, America’s various fleets of rental cars have gone through serious technological upgrades, allowing renters to trade in the old frantic hunt for a cord to plug in their cell phone and access their tunes for something much more sophisticated in the form of wireless Bluetooth pairing. But with new high-tech perks come new vulnerabilities for customers, and a surprising number of people may be leaving themselves wide open to a security breach when returning their vehicles.
Bitcoin lending platform Loanbase — formerly BitLendingClub — was the target of a recent security breach that saw a small number compromised user accounts lose at least 8 bitcoins. In an email sent to its customers, Loanbase revealed that it had discovered a security breach that occurred on the morning of February 6, 2016.
A recent breach of customer accounts at luxury retailer Neiman Marcus is, once again, putting the spotlight on the vulnerabilities created by relying only on usernames and passwords for online authentication. Until businesses and banking institutions start forcing consumers to use other types of authentication methods, such as biometrics, mobile verification codes and geo-location, merchants and banks can expect more hackers to breach customer accounts.
Cybercrime is a multibillion-dollar racket that affects corporations and individuals alike, but there are a few simple steps everyone can implement to protect against it.
“If you’re a target, which honestly most companies are, then you really have to depend on taking some basic measures,” says Kyle Lady, a research and development engineer with Duo Security.
Good news: Oracle says the next major version of its Java software will no longer plug directly into the user’s Web browser. This long overdue step should cut down dramatically on the number of computers infected with malicious software via opportunistic, so-called “drive-by” download attacks that exploit outdated Java plugins across countless browsers and multiple operating systems.
Did you receive an email advising that TurboTax Online is currently unavailable?
If you did, it’s a scam. It’s one of many circulating this tax season targeted towards taxpayers. Other similar scam emails suggest that inactivity has led to a deactivation of your TurboTax account or that your refund cannot be deposited because of a problem with your bank account. You’ll see them, like all phishing scams reported to Intuit, posted at Intuit’s Online Security Center.
To the list of things we wish we could shield children from, add identity theft. It can take years before theft of a child’s personal data—and the financial damage—is discovered.
Cyberthieves target children because their identities offer a clean slate with which to apply for bank accounts, credit cards or loans, government benefits and tax breaks. Continue Reading…
Tax preparation software publisher TaxSlayer notified about 8,800 of its customers last week that an unauthorized third party may have gained access to the personal information contained on their tax return.