The Financial Services Information Sharing and Analysis Center (FS-ISAC) has warned that financial services firms, and in particular smaller ones, are being attacked at an increased rate during the coronavirus pandemic....more
Live adult streaming website CAM4 has reportedly not secured 7TB of users’ information, which may be able to be used for blackmail and identity theft purposes, according to researchers from Safety Detectives....more
5/8/2020
/ Adult Entertainment ,
Blackmail ,
Cyber Attacks ,
Cybersecurity ,
Data Protection ,
Hackers ,
Identity Theft ,
Internet Streaming ,
Online Platforms ,
Risk Management ,
Vulnerability Assessments
With employees working from home, attackers are relying on the fact that assistants and others are not able to confirm these requests from the executives as they are not in the same physical proximity to the executives as...more
FBI Issues Warning of Increased BEC During COVID-19 Pandemic -
On April 6, 2020, the Federal Bureau of Investigation (FBI) issued a warning to companies to be aware of an increase in business email compromises (BEC)...more
4/14/2020
/ ALEXA ,
Android ,
Business E-Mail Compromise (BEC) ,
Coronavirus/COVID-19 ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Diagnostic Tests ,
FBI ,
Scams ,
Telecommuting ,
Vulnerability Assessments
Microsoft Issues Cybersecurity Risk Warning and Offers Help to Hospitals During COVID-19 Crisis -
On April 1, 2020, Microsoft issued a specific warning to health care entities alerting them that they are at particular risk...more
4/6/2020
/ Coronavirus/COVID-19 ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Microsoft ,
OCR ,
Popular ,
Telemarketing ,
Vulnerability Assessments
On April 1, 2020, Microsoft issued a specific warning to health care entities alerting them that they are at particular risk during the COVID-19 crisis, as threat actors are using the pandemic to take advantage of...more
Confirming what we are seeing in the field, cybersecurity firm Cybersecurity Ventures has predicted that, globally, businesses in 2021 will fall victim to a ransomware attack every 11 seconds, down from every 14 seconds in...more
2/18/2020
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Email ,
Hackers ,
Information Technology ,
Personally Identifiable Information ,
Phishing Scams ,
Ransomware ,
Risk Management ,
Vulnerability Assessments
Ransomware Attacks Predicted to Occur Every 11 Seconds in 2021 with a Cost of $20 Billion -
Confirming what we are seeing in the field, cybersecurity firm Cybersecurity Ventures has predicted that, globally, businesses in...more
2/14/2020
/ Bitcoin ,
Brand ,
California Consumer Privacy Act (CCPA) ,
China ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Digital Wallets ,
Drones ,
Email ,
Emergency Response ,
General Data Protection Regulation (GDPR) ,
Hackers ,
Legislative Agendas ,
Medical Devices ,
Personal Data ,
Personally Identifiable Information ,
Phishing Scams ,
Proposed Legislation ,
Regulatory Requirements ,
Risk Mitigation ,
Rulemaking Process ,
State Attorneys General ,
Threat Management ,
Unmanned Aircraft Systems ,
Vulnerability Assessments
A new study by Check Point Research shows that cyber criminals are using well-known brands to lure victims into clicking on nefarious links, providing personal information or credentials, or getting users to transfer money....more
2/14/2020
/ Apple ,
Brand ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Email ,
Facebook ,
Google ,
Hackers ,
Malware ,
Microsoft ,
Netflix ,
PayPal ,
Personally Identifiable Information ,
Phishing Scams ,
Ransomware ,
Spotify ,
Vulnerability Assessments ,
Yahoo!
The Ponemon Institute recently issued its 2020 Cost of insider Threats Global Report, which finds that the frequency and cost of insider threats is continued to increase. Sponsored by ObserveIT and IBM, the 2020 report is the...more
2/11/2020
/ Confidential Information ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Employee Misconduct ,
Information Sharing ,
Internal Controls ,
Negligence ,
Popular ,
Risk Management ,
Threat Management ,
Vulnerability Assessments
Researchers at Sentinel One and Dragos have detected malicious code, called EKANS or Snake, that has been designed specifically to target industrial control systems (ICS), including those of oil refineries, manufacturing...more
2/10/2020
/ Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Hackers ,
Information Technology ,
Malware ,
Manufacturing Facilities ,
Oil & Gas ,
Pipelines ,
Power Grid ,
Ransomware ,
Refineries ,
Risk Assessment ,
Risk Management ,
Vulnerability Assessments
Researchers at Sentinel One and Dragos have detected malicious code, called EKANS or Snake, that has been designed specifically to target industrial control systems (ICS), including those of oil refineries, manufacturing...more
2/7/2020
/ China ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Health and Human Services (HHS) ,
Drones ,
Hackers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Identity Theft ,
Infectious Diseases ,
Malware ,
Medical Records ,
OCR ,
Personally Identifiable Information ,
Point of Sale Terminals ,
Public Health ,
Retailers ,
Tax Fraud ,
Vulnerability Assessments
It’s getting difficult to keep up with the jargon of all of the new digital scams. The SaaSes in the beginning became regular business terms, such as Software-as-a-Service (SaaS), and Business Processes-as-a-Service (BPaaS)....more
1/24/2020
/ Amazon Marketplace ,
Apple Pay ,
Compliance-as-a-Solution (CaaS) ,
Cyber Crimes ,
Data Management ,
Data Protection ,
Debit and Credit Card Transactions ,
Financial Transactions ,
Malware ,
Payment Processors ,
PayPal ,
Phishing Scams ,
SaaS ,
Scams ,
Vulnerability Assessments ,
Vulnerable Victims
FBI Warns of Retaliatory Cyber-Attack from Iran -
The Federal Bureau of Investigation (FBI) is warning of a heightened likelihood of Iranian cyber-attacks following the escalation of tension between the U.S. and Iran. This...more
1/17/2020
/ Assassinations ,
California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Management ,
Data Privacy ,
Data Protection ,
Data Security ,
Dating Services ,
Drones ,
Federal Aviation Administration (FAA) ,
GAO ,
Hackers ,
Information Management ,
Iran ,
Mobile Apps ,
Online Reviews ,
Personal Data ,
Personally Identifiable Information ,
Research Reports ,
Risk Management ,
State Attorneys General ,
Unmanned Aircraft Systems ,
Vulnerability Assessments ,
Yelp
The Federal Bureau of Investigation (FBI) is warning of a heightened likelihood of Iranian cyber-attacks following the escalation of tension between the U.S. and Iran. This follows the warning last week by the Department of...more
1/17/2020
/ Assassinations ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
FBI ,
Hackers ,
Information Management ,
Infrastructure ,
Iran ,
Phishing Scams ,
Popular ,
Retaliation ,
Risk Management ,
Risk Mitigation ,
Terrorist Threats ,
Vulnerability Assessments
Department of Homeland Security Warns of Cyber-Attacks by Iran -
The Department of Homeland Security (DHS) issued a grave warning to U.S. businesses and critical infrastructure operators on January 6, 2020, alerting the...more
1/10/2020
/ Assassinations ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Drones ,
Federal Aviation Administration (FAA) ,
Financial Services Industry ,
Foreign Relations ,
Hackers ,
Information Sharing ,
Iran ,
Microsoft ,
NYDFS ,
Operating System Developers ,
Personally Identifiable Information ,
Risk Management ,
Risk Mitigation ,
Unmanned Aircraft Systems ,
Vulnerability Assessments
Pretty much the only time I don’t feel like I am Chicken Little predicting a massive cyber-attack is when I am with my colleagues at the FBI, Secret Service, NSA and my students in the Brown Executive Masters of Cybersecurity...more
1/10/2020
/ Assassinations ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Department of Homeland Security (DHS) ,
Foreign Relations ,
Hackers ,
Information Technology ,
Iran ,
Malware ,
NYDFS ,
Risk Management ,
Risk Mitigation ,
Vulnerability Assessments
Following the escalation of tensions between the United States and Iran in the past week, the Health Information Sharing and Analysis Center (H-ISAC) is warning hospitals and health systems that Iran could attack health...more
1/10/2020
/ Assassinations ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Hackers ,
Health Care Providers ,
Healthcare Facilities ,
Hospitals ,
Infrastructure ,
Iran ,
Municipalities ,
Phishing Scams ,
Risk Management ,
Risk Mitigation ,
Social Media ,
Terrorist Threats ,
Vulnerability Assessments
The Department of Homeland Security (DHS) is warning critical infrastructure operators to be on high alert for Iranian backed cyber-attacks because of the vulnerability of state and municipal computer systems, they are at...more
1/10/2020
/ Assassinations ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Hackers ,
Iran ,
Municipalities ,
Risk Management ,
Risk Mitigation ,
Terrorist Threats ,
Vulnerability Assessments
The Department of Homeland Security (DHS) issued a grave warning to U.S. businesses and critical infrastructure operators on January 6, 2020 alerting the public that Iran poses a cyber terrorism threat to the United States...more
1/9/2020
/ Assassinations ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Hackers ,
Iran ,
Popular ,
Risk Management ,
Risk Mitigation ,
Terrorist Threats ,
Vulnerability Assessments
Three million fraud cases were reported to the FTC in 2018, and 444,602 of them involved identity theft. These reported cases (just think of how high the statistic would be if all cases were reported) amounts to the third...more
12/19/2019
/ Credit Cards ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Debit and Credit Card Transactions ,
Federal Trade Commission (FTC) ,
Financial Services Industry ,
Hackers ,
Identity Theft ,
Information Security ,
Personally Identifiable Information ,
Risk Management ,
Vulnerability Assessments
Louisiana Governor John Bel Edwards activated the State’s cybersecurity team recently after several State offices’ computers started acting strangely. The IT team identified an intrusion of Ryuk ransomware and which programs...more
12/13/2019
/ Connected Items ,
Credit Cards ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Drones ,
Federal Aviation Administration (FAA) ,
Hackers ,
Information Technology ,
Municipalities ,
Personally Identifiable Information ,
PHI ,
Ransomware ,
Smart Devices ,
State and Local Government ,
Vulnerability Assessments
Holiday shopping is in full gear and everything seems to be an Internet of Things (IoT) device. It continues to amaze me how folks will buy IoT gadgets and plop them in their homes and have no idea that they include a speaker...more
12/12/2019
/ Biometric Information ,
Children's Products ,
Children's Toys ,
Connected Items ,
Data Collection ,
Data Protection ,
FBI ,
Federal Trade Commission (FTC) ,
Hackers ,
Holiday Gifts ,
Information Technology ,
Internet of Things ,
Mobile Device Management ,
Mobile Devices ,
Risk Management ,
Smart Devices ,
Vulnerability Assessments
The predictions set forth in Experian’s Seventh Annual Data Breach Industry Forecast make sense and are worth a read. We are starting to see these types of intrusions and scams, and our experience is that once these types of...more
12/12/2019
/ Cannabis-Related Businesses (CRBs) ,
Cryptocurrency ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Debit and Credit Card Transactions ,
Drones ,
Hackers ,
Hemp Related Businesses ,
Identity Theft ,
Marijuana Related Businesses ,
Personally Identifiable Information ,
Point of Sale Terminals ,
Scams ,
Unmanned Aircraft Systems ,
Vulnerability Assessments ,
Wifi
For those of you who have downloaded the face editing app FaceApp, please note that the Federal Bureau of Investigation (FBI) has classified FaceApp as a counterintelligence threat because of its Russian origins....more
12/6/2019
/ Biometric Information ,
Consumer Privacy Rights ,
Cyber Threats ,
Facial Recognition Technology ,
FBI ,
Mobile Apps ,
Mobile Devices ,
Privacy Policy ,
Russia ,
Terms of Use ,
Vulnerability Assessments