Free tools and resources for Data Protection Officers!

Tag Archives for " hacking "

Nearly half of UK small businesses believe a cyberattack could close their business

Every second small and medium-sized business in the UK could be forced to close if they were hit by a major cyberattack, a new study suggests.

The report, titled “Size Does Matter,” details the challenging climate for UK SMBs in a time of rapid political, economic and social change.

Full article: Nearly half of UK small businesses believe a cyberattack could close their business

China hacked Norway’s Visma to steal client secrets

Hackers working on behalf of Chinese intelligence breached the network of Norwegian software firm Visma to steal secrets from its clients, cyber security researchers said, in what a company executive described as a potentially catastrophic attack.

Source: China hacked Norway’s Visma to steal client secrets: investigators | Reuters

Report reveals the dangers and trends of malware through 2018

Last year, the arrival of the EU’s General Data Protection Regulation sent shockwaves through the world of data protection. Big corporates registered record-breaking data breaches, while pre-GDPR transgressions such as those committed in the Facebook/Cambridge Analytica scandal fell under heightened scrutiny of a more privacy-conscious age.

Full article: Report reveals the dangers and trends of malware through 2018

Security in a Digital World

In recent years, the issue of cybersecurity has garnered significant attention in the national conversation. Attacks like those on Facebook as well as others have caused Americans to worry about the security of their personal information and whether or not they are sufficiently protected from such potential threats.

Recent reports have shown a significant increase in the number of cyber attacks, many perpetrated against large banks and other institutions with highly sensitive information. The contrast to a decade ago, when cyber attacks were much less prevalent, is stark.

Full article: Security in a Digital World | Harvard Political Review

Largest collection of breached data ever seen is found

The largest collection of breached data ever seen has been discovered, comprising of more than 770m email addresses and passwords posted to a popular hacking forum in mid-December.

The 87GB data dump was discovered by security researcher Troy Hunt, who runs the Have I Been Pwned breach-notification service. Hunt, who called the upload “Collection #1”, said it is probably “made up of many different individual data breaches from literally thousands of different sources”, rather than representing a single hack of a very large service.

Source: Largest collection of breached data ever seen is found | Technology | The Guardian

Should cyber officials be required to tell victims of cyber crimes they’ve been hacked?

Since early December Germany’s Federal Office for IT Safety (BSI for its German initials) had been tracking a cyber attack targeting some of the country’s parliamentarians that ultimately led to the public release of their mobile phone numbers, credit card information and ID card details.

Only some MPs were informed by BSI about the attacks, while others learned about them only after the details were published in the media. MPs were outraged that BSI had failed to notify them that their personal data was being targeted, despite knowing about elements of the attack for up to four weeks.

Full article: Should cyber officials be required to tell victims of cyber crimes they’ve been hacked?

2-factor authentication may be hackable, expert says

Cybersecurity professionals have advised enabling two-factor to add an extra layer of security — but according to at least one expert, this may not be a silver-bullet. Kevin Mitnick, who was once the FBI’s most wanted hacker and now helps companies defend themselves, found that two factor authentication can be vulnerable.

Full article: 2-factor authentication may be hackable, expert says

How Hackers Bypass Gmail 2FA at Scale

Hackers can bypass these protections, as we’ve seen with leaked NSA documents on how Russian hackers targeted US voting infrastructure companies. But a new Amnesty International report gives more insight into how some hackers break into Gmail and Yahoo accounts at scale, even those with two-factor authentication (2FA) enabled.

They do this by automating the entire process, with a phishing page not only asking a victim for their password, but triggering a 2FA code that is sent to the target’s phone. That code is also phished, and then entered into the legitimate site so the hacker can login and steal the account.

Full article: How Hackers Bypass Gmail 2FA at Scale – Motherboard

How one hacked laptop led to an entire network being compromised

A corporate laptop being used in a coffee shop at a weekend was enough to allow a sophisticated cybercrime group to compromise an organisation’s entire infrastructure.

The incident was detailed by cybersecurity firm Crowdstrike as part of its Cyber Intrusion Services Casebook 2018 report and serves as a reminder that laptops and other devices that are secure while running inside the network of an organisation can be left exposed when outside company walls.

Full article: How one hacked laptop led to an entire network being compromised | ZDNet

Cybersecurity in 2019

While you prepare your defenses against the next big thing, also pay attention to the longstanding threats that the industry still hasn’t put to rest.

Will 2019 be the year we see a nation-state take down a large-scale industrial installation? How much of the world’s cryptocurrency will be mined by hackers using unsuspecting endpoints? What kind of damage can we expect from well-intentioned but misguided vigilantes? And what does it all mean to you?

Full article: Cybersecurity in 2019: From IoT & Struts to Gray …

1 2 3 18
>