Fresh Vulnerabilities

June 24, 2015
Comments [0]

By Byron Acohido, ThirdCertainty

Facebook now has the ability to recognize a person in photographs even when their face can’t be seen. The company is testing DeepFace, a new algorithm in its artificial intelligence lab, which uses cues such as hairstyles, clothing or body language to identify a person. It is so good, according to New Scientist, that it can pick a person out of a lineup. “People have characteristic aspects, even if you look at them from the back,” Yann...

Read More
June 23, 2015
Comments [0]

By Byron Acohido, ThirdCertainty

 The personal information of an estimated 18 million current, former and prospective federal employees was affected by a cyber breach at the Office of Personnel Management—more than four times the 4.2 million the agency has publicly acknowledged. The number is expected to grow, according to U.S. officials briefed on the investigation. Those affected could include people who applied for government jobs, but never worked...

Read More
May 26, 2015
Comments [0]

By Byron Acohido, ThirdCertainty

How much is too much?

Lloyd’s of London wants to ensure it avoids a “dangerous aggregation” of insurance related to the risks of a catastrophic cyber attack. Current cyber risk capacity in London is about $440.3 million, said Toby Clowes, a broker at Safeonline. Lloyd’s introduced a risk code for cybersecurity property damage and updated its risk code for cybersecurity data and privacy breach coverage, which allows its performance management team to...

Read More
May 8, 2015
Comments [0]

By Byron Acohido, ThirdCertainty

In your hands: Google’s next Android update will give users more detailed choices on what information apps can access. That includes access to photos, contacts and location data. Apple added similar security features more than two years ago. The announcement is expected at the Google IO developer conference later this month. Source:...

Read More
April 28, 2015
Comments [0]

By Byron Acohido, ThirdCertainty

On the uptick, and that’s bad: There were a record 783 data breaches in 2014, according to the Identity Theft Resource Center, a major rise from both the previous year and 2010’s peak. The Federal Trade Commission recorded 332,646 identity-theft complaints in 2014. All forms of fraud, including identity theft, cost Americans about $1.7 billion in 2014, an average of more than $2,000 per incident. The Consumer Sentinel...

Read More
April 24, 2015
Comments [0]

By Byron Acohido, ThirdCertainty

CHICAGO—Meaner than a junkyard dog: Junkyards have become a hunting ground for identity theft con artists, who are rummaging through junked vehicles for forgotten documents. “Identity thieves are treasure hunters for information,” said Danny Lents, who runs IDTheftAwareness.com, a protection tips site. “That W-2 … that’s the sweet spot,” he said. People who have their cars towed are urged to remove all paperwork from...

Read More
April 21, 2015
Comments [0]

By Byron Acohido, ThirdCertaintySAN FRANCISCO

Do you know the way to RSA? San Francisco is welcoming more than 28,000 computer security experts to the RSA Conference, the world’s largest security gathering. Breach announcements are common at such events, and Check Point has released information showing that online auction site eBay’s Web e-commerce platform had a “critical vulnerability” that could affect up to 200,000 online shops. EBay has provided a patch to customers. Source:...

Read More
April 15, 2015
Comments [0]

By Byron Acohido, ThirdCertainty

Passenger pilots? Planes could be hacked in flight by passengers using the aircraft’s wireless entertainment system to access flight controls, according to the Government Accountability Office. The issue is among a number of possible cyber security weaknesses that the Federal Aviation Administration must address as technology advances. “Internet connectivity in the cabin should be considered a direct link between the...

Read More
April 14, 2015
Comments [0]

By Byron Acohido, ThirdCertainty

By the numbers. Derived from actual forensic cases, Verizon’s Data Breach Investigation Report is considered the gold standard of security metrics. The 11th annual DBIR, issued today, distills patterns from 79,790 security incidents, including 2,122 with confirmed data losses globally. The hardest hit sectors: Public, Technology/Information, and Finance. Some 75 percent of attacks spread from one victim to another within 24 hours, and...

Read More
April 9, 2015
Comments [0]

By Byron Acohido, ThirdCertainty

Russia in the house: Russian hackers penetrated sensitive parts of the White House computer system, say U.S. officials briefed on the investigation of the October incident. Hackers had access to information such as details of the president’s schedule. The FBI, Secret Service and intelligence agencies consider the breach among the most sophisticated attacks ever against U.S. government systems. Senior National Security...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started