fbpx

Download free GDPR compliance checklist!

Tag Archives for " hacking "

Malware Capable of Shutting Down Electric Grids Confirmed

Malware was recently identified that appears to have been designed and deployed by a nation-state to target and shut down electric grids. According to published reports, this malware currently appears to be capable of attacking the European grids, and parts of the Middle East and Asia grids, by targeting the specific industrial control system network protocols used to operate those grids. With small modifications, the malware reportedly also appears to be capable of attacking the North American power grid, as well as other industries that use ICS networks (e.g., oil, gas, water, data) around the globe. This post discusses the malware as well as vulnerability management.

Source: Malware Capable of Shutting Down Electric Grids Confirmed | HL Chronicle of Data Protection

Why the WannaCry outbreak should be a wake-up call

WannaCry, the ransomware that recently swept the world and brought down computer systems in more than 100 countries, can be viewed as many things: an attempt to extort money from individuals and businesses whose data was taken hostage; an atrocity that put human life at risk in the case of compromised medical systems and medical devices; and a focal point in discussions on responsible disclosure, to name just a few.

But boiled down, WannaCry should be universally viewed as one thing: a wake-up call.

Source: Why the WannaCry outbreak should be a wake-up call

OneLogin Breached. Here’s What You Need to Do.

Single sign-on provider OneLogin has experienced a breach. If you or your company uses OneLogin to sign in to applications, or if you use any of their other services, you need to be aware of this and may need to take several actions immediately.

Source: PSA: OneLogin Breached. Here’s What You Need to Do.

The next big personal data attack waiting to happen…

With data security of all organisations under significant threat from external actors, all organisations need to review the security of processing personal data as a matter of urgency. And such reviews must include the use of Bring Your Own Devices (BYOD) as well as the Internet of Things (IoT) used in the workplace.

Source: The next big personal data attack waiting to happen… | Ardi Kolah LL.M | Pulse | LinkedIn

>