Dawn Causey, Thomas Pinder and Andrew Doersam write: Banks frequently absorb fraud losses when the consumer is compensated for damage done by other sectors. When retailers with questionable security protocols are breached, banks support the customer throughout the fraud cycle: consumer outreach and notification, card reissuance, enhanced transaction monitoring and reassurance that the bank’s systems…
Category: Commentaries and Analyses
UK: University Cyber Attacks Down To Students, Staff?
Tom Jowitt reports: Organised crime and hacking groups may not be responsible for the spate of cyber-attacks against universities and colleges in the UK. This is said to be the conclusion of a security analysis of the attacks carried out by Jisc, the UK provider of ICT (Information and Communications Technology) services for the education…
Healthcare in the Cross Hairs: Insider Threat
Craig A. Newman writes: The healthcare industry has been in the sights of hackers for some time. But a recent survey found that the biggest threat in the sector comes from within. Verizon has just released its Protected Health Information Data Breach Report and found that 58% of the data security incidents in the industry…
Bugs in ProtonVPN, NordVPN Left Windows Vulnerable to Hackers
Adam Smith reports: ProtonVPN and NordVPN were exposed to vulnerabilities that could have allowed hackers to execute arbitrary code with administrator privileges on computers running Windows. The bugs, CVE-2018-3952 (affecting NordVPN) and CVE-2018-4010 (affecting ProtonVPN), were discovered by Cisco Talos security researchers and are similar to another security flaw (tracked as CVE-2018-10169) discovered in March…
Lifting the lid off cybercrime: Verizon’s 2018 Data Breach Digest
Clare Ward writes: Once again, Verizon has opened the doors on the reality of a data breach with the launch of the Verizon 2018 Data Breach Digest (DBD) series, enabling businesses to read undisclosed stories from the company’s cyber-investigative vault. The Data Breach Digest series puts cybercrime in context, outlining the (anonymized) specifics of data…
Like Moths to a Flame
Doug Levin has a great piece on a real case of curious students exploring their K-12 district’s network. Of course, they “shouldn’t” have done that, right? Every adult in the room knows that, and the kids knew it, too. But the temptation was just soooooo great. So do read The Case of ‘Joseph Jones’ and the…