Monday, February 1, 2021

Personal data breaches decline as hackers focus on companies | PropertyCasualty360

The personal and financial details of more than 400,000 customers were compromised in the 2018 cyberattack.

* * *

Consumers report increasing concerns around data security yet are now more willing to share personal details with insurers for lower rates.

Discover the areas of your business where KPIs can be impacted more quickly and successfully using smart digital innovations.

Competing for profitable growth, especially against larger carriers, on just price will ultimately fail. By becoming customer-centric, you can discover the best way to retain customers while keeping growth, loss ratio, and related metrics in line with your goals.

Publisher: PropertyCasualty360
Date: 2021-02-01
Author: Steve Hallo
Twitter: @PC_360
Reference: (Read more) Visit Source



While you're here, how about this:

Avast Hacker Archives Episode 2 - Katie Moussouris | Avast - Security Boulevard

Hosted by Avast CISO Jaya Baloo, the Avast Hacker Archives (AHA) series showcases the valuable "Aha!" moments achieved by white hat hackers and researchers that changed the course of our digital world.

In Episode 2, Jaya interviews Katie Moussouris, founder and CEO of Luta Security. She specializes in helping businesses and governments work with hackers to better defend themselves from digital attacks.

Further reading:
Introducing Avast Hacker Archives
Avast Hacker Archives Episode 1: Joe FitzPatrick

Publisher: Security Boulevard
Date: 2021-01-29T08:34:00 00:00
Twitter: @securityblvd
Reference: (Read more) Visit Source



Hackers target gamers with a supply-chain attack | IT PRO

Currently, the supply-chain attack has infected gamers in Asia with three malware strains. There is no sign of hackers using the malware for financial gain, but researchers have discovered hackers are using the malware for surveillance.

* * *

Researchers discovered indicators of compromise in September 2020, but it wasn't until January 25 that they uncovered explicitly malicious activity. They immediately reported the malicious activity to BigNox.

Publisher: IT PRO
Author: Rene Millman
Twitter: @ITPro
Reference: (Read more) Visit Source



Hezbollah's cyber unit hacked into telecoms and ISPs | ZDNet

Simple steps can make the difference between losing your online accounts or maintaining what is now a precious commodity: Your privacy.

The year-long hacking campaign started in early 2020 and was discovered by Israeli cyber-security firm Clearsky.

"It seems that the attacks aimed to gather intelligence and steal the company's databases, containing sensitive data," ClearSky said today.

"In case of telecommunication companies, one can assume that databases containing call records and private data of clients were accessed as well," the company added.

logo
Publisher: ZDNet
Author: Catalin Cimpanu
Twitter: @ZDNet
Reference: (Read more) Visit Source



And here's another article:

Apple says iOS 14.4 fixes three security bugs ‘actively exploited’ by hackers –

Apple has released iOS 14.4 with security fixes for three vulnerabilities, said to be under active attack by hackers.

The technology giant said in its security update pages for iOS and iPadOS 14.4 that the three bugs affecting iPhones and iPads “may have been actively exploited.” Details of the vulnerabilities are scarce, and an Apple spokesperson declined to comment beyond what’s in the advisory.

* * *

It’s a rare admission by Apple, which prides itself on its security image, that its customers might be under active attack by hackers.

Publisher: TechCrunch
Date: 2021-01-26 12:29:10
Twitter: @techcrunch
Reference: (Read more) Visit Source



The Next Cyberattack Is Already Under Way | The New Yorker

It's tempting to say either I can't worry about this right now or Didn't we already know this ? For all the sensationalism of "This Is How They Tell Me the World Ends"—not least the title—much here fails to surprise: all code has bugs; it's virtually impossible and prohibitively expensive to write perfect code; and bad actors can exploit those bugs to break into everything from your iPad to the Hoover Dam.

Cyberattacks made headlines, and then vanished. In 2008, Russia got into a network at the Pentagon; hackers broke into the campaigns of both Barack Obama and John McCain; the next year, North Korea compromised the Web sites of everything from the Treasury Department to the New York Stock Exchange. In 2010, a computer worm called Stuxnet, created by the U.S. and Israel in an operation approved by George W. Bush and continued by Obama, was discovered to have devastated Iran's nuclear program.

Publisher: The New Yorker
Author: Jill Lepore
Twitter: @NewYorker
Reference: (Read more) Visit Source



A Chinese hacking group is stealing airline passenger details | ZDNet

A suspected Chinese hacking group has been attacking the airline industry for the past few years with the goal of obtaining passenger data in order to track the movement of persons of interest.

Today's security threats have expanded in scope and seriousness. There can now be millions -- or even billions -- of dollars at risk when information security isn't handled properly.

* * *

The initial report mentioned a series of coordinated attacks against the Taiwanese superconductor industry.

Publisher: ZDNet
Author: Catalin Cimpanu
Twitter: @ZDNet
Reference: (Read more) Visit Source



New Charges Derail COVID Release for Hacker Who Aided ISIS — Krebs on Security

Between 2015 and 2019, Ferizi was imprisoned at a facility in Illinois that housed several other notable convicts. For example, prosecutors allege that Ferizi was an associate of Mahmud “Red” Abouhalima , who was serving a 240 year sentence at the prison for his role in the 1993 World Trade Center bombing .

Ferizi is being tried in California, but has not yet had an initial appearance in court. He’s charged with one count of aggravated identity theft and one count of wire fraud. If convicted of wire fraud, he faces a maximum penalty of 20 years in prison and a fine of $250,000. If convicted of aggravated identity theft, he faces a mandatory penalty of 2 years in prison in addition to the punishment imposed for a wire fraud conviction.

Twitter: @briankrebs
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment