Eileen Brown reports on the results of yet another survey that asks consumers what they would do in the event a company was breached. I’ve discussed these kinds of surveys before and the difference between what people say they would do and what people may actually do. To see which applies in this case, read…
Category: Commentaries and Analyses
‘Catastrophic data loss’ affects thousands of Hamilton County Sheriff’s Office dashcam videos
Rosana Hughes reports: A “catastrophic data loss” caused thousands of Hamilton County Sheriff’s Office videos from dashboard cameras to disappear — and potentially could jeopardize criminal and civil cases. All dash camera footage for all 130 patrol deputies between Oct. 25, 2018, and Jan. 23 of this year was lost after a software failure on…
FBI Warned Of Fraudster’s Paradise: Up To 130,000 Hacked Asus Routers On Sale For A Few Dollars
Thomas Brewster reports: The FBI has been tipped off about a novel cybercriminal operation in which a hacker managed not only to breach as many as 130,000 Asus routers, but is also scoring them as to how useful they might be for fraudsters. This hacker’s selling access to those individual Asus devices—most of them based…
Nemty Ransomware Actively Distributed via ‘Love Letter’ Spam
Sergiu Gatlan reports: Security researchers have spotted an ongoing malspam campaign using emails disguised as messages from secret lovers to deliver Nemty Ransomware payloads on the computers of potential victims. The spam campaign was identified by both Malwarebytes and X-Force IRIS researchers and has started distributing malicious messages yesterday via a persistent stream of emails. Read…
How a Hacker’s Mom Broke Into a Prison—and the Warden’s Computer
Lily Hay Newman reports: John Strand breaks into things for a living. As a penetration tester, he gets hired by organizations to attack their defenses, helping reveal weaknesses before actual bad guys find them. Normally, Strand embarks on these missions himself, or deploys one of his experienced colleagues at Black Hills Information Security. But in…
Ransomware Against the Machine: How Adversaries are Learning to Disrupt Industrial Production by Targeting IT and OT
Daniel Kapellmann Zafra, Keith Lunden, Nathan Brubaker, and Jeremy Kennelly of FireEye write: Since at least 2017, there has been a significant increase in public disclosures of ransomware incidents impacting industrial production and critical infrastructure organizations. Well-known ransomware families like WannaCry, LockerGoga, MegaCortex, Ryuk, Maze, and now SNAKEHOSE (a.k.a. Snake / Ekans), have cost victims…