2019 Breaches

Big Data, Data Brokers and Your Information

Big Data, Data Brokers and Your Information

Big Data, Data Brokers and Your Information   Big Data brokers collect our data and establish “hidden” ratings about us before selling it to those who will pay. This information is used by marketers, insurance companies, credit companies, and merchants. ...

read more
Turns Out It Wasn’t Just Capital One

Turns Out It Wasn’t Just Capital One

Turns Out It Wasn’t Just Capital One   Federal prosecutors say a woman charged in a massive data breach at Capital One may have hacked more than 30 other organizations. Paige Thompson, of Seattle, was arrested last month after the FBI said she obtained personal...

read more
Old Scam on Uptick – Beware

Old Scam on Uptick – Beware

Old Scam on Uptick - Beware   A long-running scam email campaign that pretends to be an unsubscribe confirmation request has seen an uptick recently. These emails should never be clicked on or responded to as they are designed to harvest working email addresses...

read more
Is Someone Lurking in Your Computer?

Is Someone Lurking in Your Computer?

Is Someone Lurking in Your Computer? Whether you're in an open office where colleagues regularly wander past or live somewhere—like a college dorm—where you may feel comfortable leaving your laptop unattended in the presence of relative strangers, it can be all too...

read more
O365 Non-Security – again

O365 Non-Security – again

O365 Non-Security - again   The US Cybersecurity and Infrastructure Security Agency (CISA) has become the latest government body to plead with admins to implement security best practices on Microsoft's Office 365 platform. The UK's National Cyber Security Centre...

read more
Be Careful What You Browse — Drive By Malware on the Rise

Be Careful What You Browse — Drive By Malware on the Rise

Be Careful What You Browse -- Drive-By Malware on the Rise   An ongoing operation that’s installing ransomware and other malware on the computers of unsuspecting website visitors is one of the most potent drive-by attack campaigns researchers have seen in recent...

read more
Are You Ready? Iranian Cyber Counter Attacks

Are You Ready? Iranian Cyber Counter Attacks

Are You Ready? Iranian Cyber Counter Attacks   U.S. businesses should get ready for a barrage of digital retaliation from Iran after the Trump administration launched a cyber attack against the Islamic Republic’s rocket and missile launching systems, current, and...

read more
Is Your App Safe?  Maybe Not!

Is Your App Safe? Maybe Not!

Is That App On Your SmartPhone Safe? Maybe Not!   High-risk vulnerabilities are common across both Android and iOS mobile apps, with Android devices slightly more at risk than their iOS counterparts (43% vs. 38%), according to Positive Technologies'...

read more
When Your Vendors Become A Cyber Liability

When Your Vendors Become A Cyber Liability

When Your Vendors Become A Cyber Liability   If It's Digital, It's Hackable Customs and Border Protection failed to keep their photographic database of vehicular traffic crossing through US border crossings safe. It involved a single lane at one border crossing...

read more
HawksShop.com Compromised by Card Skimming Malware

HawksShop.com Compromised by Card Skimming Malware

Who: Atlanta Hawks’ online shop # of Accounts Breached: undetermined What was affected: Customers names, addresses and payment card numbers. When it happened: Started on June 6, 2017 How it happened: Cybercriminals using Magecart card-skimming code attacked the online...

read more