Kevin Collier reports: Targeted ransomware attacks on local US government entities — cities, police stations and schools — are on the rise, costing localities millions as some pay off the perpetrators in an effort to untangle themselves and restore vital systems. The tally by cybersecurity firm Recorded Future — one of the first efforts to…
Category: Commentaries and Analyses
Utah picked a tech company for its medical cannabis program that has a history of glitches and hacks. But it’s cheap.
That’s a pretty bold headline from the Salt Lake Tribune, isn’t it? Bethany Rodgers reports: Utah is preparing to strike a deal with a Denver-based software company to build the digital backbone of the state’s emerging medical cannabis program, despite the business’ problems with outages, crashes and hacks in other states. The vendor, MJ Freeway,…
Why Rewards for Loyal Spenders Are ‘a Honey Pot for Hackers’
Tiffany Hsu reports: The punch cards stuffed in your wallet know next to nothing about you, except maybe how many frozen yogurts you still need to buy to get a free one. But loyalty programs, as they shift from paper and plastic to apps and websites, are increasingly tracking a currency that can be more…
2019 Verizon Data Breach Investigations Report (DBIR) is Out
This year, Verizon’s DBIR is based on data from 41,686 security incidents and 2,013 data breaches provided by 73 data sources, both public and private entities, spanning 86 countries worldwide. You can read the Executive Summary here, or read the full report here. There are some data in it that may raise an eyebrow or…
Eanes ISD Parents Outraged Over Tablet Security
Carolos Garcia reports: WEST LAKE HILLS, Texas — Meaghan Edwards keeps a close eye on how much screen time her kids get at home, but after a phone call back in March, she wants to limit screen time at school, too. “You’ve got to come here immediately something terrible has happened. Can you come to…
Lucy Security Simulated Phishing Template Used In Wipro Breach
Ray Schultz reports: Lucy Security Inc. says its Simulated Phishing template design was used in a recent data breach of Wipro, an IT outsourcing firm based in India. Hackers “downloaded and copied a simulated phishing template, as part of their attack, using their own code and servers to deliver the attacks,” states Colin Bastable, CEO…