Sorry, you need to enable JavaScript to visit this website.

Blog

January 18, 2019
Comments [0]

A massive leak of unprotected data on a server belonging to the Oklahoma Securities Commission was discovered in December 2018.

Three terabytes of data were leaked, including evidence from hundreds of FBI investigations. Details in the material gone walkabout included financial transactions, emails relating to cases as well as letters from witnesses. Also included were email archives spanning 17 years, thousands of social security numbers, and passwords for remote access to agency...

Read More
January 14, 2019
Comments [0]

AT&T and T-Mobile announced that in March 2019 they would stop selling user location data to third parties. The announcements came on the heels of a Motherboard article that reported on the ability to track individual cellular phones via “location aggregator” companies with access to mobile customer information.

Cellular location data was sold...

Read More
January 7, 2019
Comments [0]

Hackers have published the personal data and documents of hundreds of German politicians and celebrities online.

The data breach was announced by the German government. It included personally identifiable information of politicians and other public figures, and included credit card numbers, email addresses, mobile phone numbers, chat transcripts, and photos of identification.

The information was leaked over the last several weeks on a Twitter account called G0d, and targeted...

Read More
January 3, 2019
Comments [0]

A cyberattack disrupted several major newspapers printed by Tribune Publishing shortly before New Year’s Day.

Print versions of the Chicago Tribute, Los Angeles Times, San Diego Union Tribune, West Coast editions of the New York Times and Wall Street Journal and others were the suspected targets of Ryuk, a ransomware program that propagates through computer networks in order to take them offline. A similar attack disabled a North Carolina water utility in late 2018...

Read More
December 19, 2018
Comments [0]

The U.S. Ballistic Missile Defense System (BMDS) falls short of critical cybersecurity standards, according to an audit issued by the Department of Defense Inspector General.

The report issued by the Inspector General’s office details several basic lapses in security protocols at five separate locations, including:

A lack of multifactor authentication to access BMDS technical information... Read More
December 18, 2018
Comments [0]

The cyberattack on the Marriott hotel chain that exposed the information of up to 500 million guests was most likely conducted by Chinese state-affiliated hackers, according to a preliminary investigation.

Unnamed government sources for the New York Times and Washington Post familiar with the investigation of the breach have said that the methods utilized by the hackers, as well as the targeted data both suggest that the attacks are linked to the Chinese Ministry of State Security....

Read More
December 17, 2018
Comments [0]

A bug on Facebook gave app developers unauthorized access to the photos of as many as 6.8 million users.

The bug, which affected Facebook’s photo API, was active from September 13 through September 25, when it was discovered by Facebook and fixed. September 25 was coincidentally the same day the company announced a massive security breach...

Read More
December 13, 2018
Comments [0]

A group of fifteen U.S. Senators have introduced a federal privacy bill called the Data Care Act, which has set its sights on the implementation of nationwide privacy standards that would apply to websites, apps, and online content providers. The goal: safeguard consumer data.

“People have a basic expectation that the personal information they provide to websites and apps is well-protected and won’t be used against them,” said Senator Brian Schatz (D-HI) who spearheaded the bill. “...

Read More
December 12, 2018
Comments [0]

New York Times report about the ways smartphone apps track users and sell their location data (on a far greater scale than most customers realize) has gotten much deserved attention this week.

One data sample obtained by the Times showed records of a company updating users’ locations up to 14,000 times a day in 2017.

While many users allow location tracking on their mobile...

Read More
December 10, 2018
Comments [0]

Hackers stole tens of millions of dollars from Eastern European banks in a campaign called “DarkVishnya.” The method deployed by the hackers relied on devices connected at the physical location of the targets, rather than attempting to breach networks remotely.

There were several steps to the hack. The first step involved planting in the target banks a device. There types were used: a netbook or equivalent laptop, an inexpensive micro computer favored by hobbyists called a Raspberry...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started