Malware, Phishing, Virus & Malware
May 23, 2017
Via: Security WeekThe Russian Interior Ministry announced on Monday that authorities dismantled a major cybercrime gang that had stolen nearly $900,000 from bank accounts after infecting more than one million Android smartphones with a Trojan. Authorities said they identified 20 suspects in […]
May 16, 2017
Via: Help Net SecurityNews of data breaches and the risks of identity theft and fraud persist, but consumers’ vigilance and awareness haven’t kept pace. A national survey by Experian revealed that not only is America’s collective guard down, but people feel they are […]
April 14, 2017
Via: Help Net SecurityIdentity theft is a type of fraud that’s directed squarely against individuals, but to believe that businesses don’t suffer any consequences or costs associated with it is simply wrong. Identity theft effects According to a recent survey about the aftermath […]
March 22, 2017
Via: DataBreach TodayA federal judge has granted class-action status for a breach-related lawsuit against an Alabama hospital where a former employee was convicted of identity theft that led to federal tax refund fraud. In a March 17 ruling, a U.S. district judge […]
February 8, 2017
Via: Zone AlarmApproximately 15 million residents of the United States are victims of identity theft per year. It’s important to protect yourself by taking certain precautions to ensure your data isn’t vulnerable to hackers. These 6 recommendations will ensure you’re protected against […]
November 17, 2016
Via: Schneier on SecurityThis is some interesting research. You can fool facial recognition systems by wearing glasses printed with elements of other peoples’ faces. Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, and Michael K. Reiter, “Accessorize to a Crime: Real and Stealthy Attacks on […]
September 26, 2016
Via: Security AffairsA recent investigation by Kaspersky Labs reports that a number of underground sellers are offering skimmers, which have the capability of stealing users biometric data such as fingerprints. A number of others are researching iris scanning and palm vein recognition […]
August 30, 2016
Via: CSO OnlineIdentity management continues to fall into the top security efforts needed to protect information resources. However, traditional solutions rely on significant human analysis and management: analysis and management that result in high productivity costs for analysts and managers. And even […]
August 12, 2016
Via: CSO OnlineMost organizations’ external perimeter is pretty buttoned up. But once you make it inside it’s still pretty weak. It’s a pretty quick operation to go from social engineering to exploit somebody’s workstation, to pivoting in the environment and escalate all […]
July 19, 2016
Via: Security IntelligenceRoughly once a month, every month, there is a new article or report of a hospital held hostage by ransomware; a former employee stealing hospital records; the careless loss of a laptop, smartphone or tablet PC by hospital personnel; or […]
Identity theft, Privacy protection
June 23, 2016
Via: Krebs on SecurityWith the proliferation of shadowy black markets on the so-called “darknet” — hidden crime bazaars that can only be accessed through special software that obscures one’s true location online — it has never been easier for disgruntled employees to harm their current or […]
June 15, 2016
Via: MalwarebytesPhishers are back to using an old tactic in a new fashion to get hold of their victims’ credentials. One of the first lessons you will learn during anti-phishing training is to hover over the links in a mail to […]
June 10, 2016
Via: Security IntelligenceMany data breaches begin with bad actors stealing legitimate user credentials — a fundamental flaw in wider security systems. Logically, by locking down user identities, you can protect against stolen credentials and insider threats. But what if that threat is […]
June 1, 2016
Via: Help Net SecurityCompromised credentials are still the cause of almost a quarter of all data breaches, according to the Cloud Security Alliance. With a surge in cybercrime, it’s no wonder that the global identity and access management (IAM) market is expected to […]
Access control, Editorial, Identity theft, Mobile security, Privacy protection
March 9, 2016
Via: Russel EdwardsFingerprint scanners have had primitive aspects throughout history. The use of fingerprints (or more exactly handprints) in authentication dates back to 1858. Sir William Herschel, Chief Magistrate, introduced the identification via handprint for his civil service employees in India. It […]
February 23, 2016
Via: SC MagazineKankakee Valley REMC reported a possible data breach after a cybersecurity audit revealed a foreign Internet Protocol address had accessed a storage device on the cooperative’s network. How many victims? 17,700 Kankakee Valley REMC members What type of information? Members’ […]
February 4, 2016
Via: Dark ReadingAnalysis of public data breaches finds US and UK represented more than 45% of all reported breaches last year, and major energy firms make the list of most multiple breaches. A tally of reported data breach incidents worldwide in 2015 […]
February 1, 2016
Via: CSO OnlineThe Federal Trade Commission unveiled a revamped online hub where victims of identity theft can file complaints and receive a personalized recovery plan to regain control of their personal and financial information and accounts. At IdentityTheft.gov, consumers can navigate through […]
Access control, Identity theft
December 24, 2015
Via: CSO OnlineA few weeks ago, Kristen Faughnan got something that surprised her: a “low balance” text message from her bank. That didn’t make sense. She’d just paid for a haircut, but she knew how much was in her account. Even after […]
Cloud security, Privacy protection
November 26, 2015
Via: Help Net SecurityIdentity Mixer, a new tool to protect a consumer’s personally identifiable information, is now generally available on IBM Cloud. The tool is built on years of cryptography research, and holds the key to helping to reduce identity theft happening as […]