Thursday, May 24, 2018
It’s a Zoo Out There! Data Analysis of Alleged ZooPark Dump

It’s a Zoo Out There! Data Analysis of Alleged ZooPark Dump

In early May, researchers disclosed a Mobile malware campaign by a group focused on Middle Eastern targets. This actor was found to be an evolving and sophisticated group using fake Android apps, namely Telegram, to trick users into installing malicious software. They have been active since 2015 and evolved over several campaigns into 2018. On…
Customer Consent Allows Leak of Location Data

Customer Consent Allows Leak of Location Data

Customer Consent Allows Leak of Location DataWhether stolen or accidentally leaked, the location data of mobile phone customers has been making headlines for much of May. The latest announcement came yesterday from KrebsOnSecurity, with news that a bug in the website of US-based tracking firm LocationSmart was leaking real-time location information of mobile phone customers. What is…
Sensitive Data on 3 Million Facebook Users Potentially Exposed by Suspended App

Sensitive Data on 3 Million Facebook Users Potentially Exposed by Suspended...

From Facebook to Twitter and now back to Facebook – the past few months have seen some of the most popular social media platforms out there today struggling with securing consumer data. And just today, news broke that a new data breach has potentially exposed 3 million Facebook users’ data via an app called myPersonality.…
2018: Scariest Year of Evil Things on the Internet

2018: Scariest Year of Evil Things on the Internet

2018: Scariest Year of Evil Things on the InternetActs of evil on the internet are on the rise, according to the 2018 Internet of Evil Things survey. In its fourth consecutive year, the survey, conducted by Pwnie Express, polled more than 500 security professionals and found their collective responses to be "the scariest survey results…
Study: Digital Self-Harm Among Teens Real; Here’s What Parents Need to Know

Study: Digital Self-Harm Among Teens Real; Here’s What Parents Need to...

When we think of self-harm, most of us think about rituals such as cutting in which a person may physically cut themselves in an attempt to deal with overwhelming emotions. Very few of us, especially parents, think about self-harm manifesting itself in the digital realm. However, according to a new study published in the Journal of…
Small-Business Owners Unaware of Looming GDPR

Small-Business Owners Unaware of Looming GDPR

Small-Business Owners Unaware of Looming GDPRWith only a week remaining before the General Data Protection Regulation (GDPR) goes into effect across the European Union, nearly a quarter of small-business owners are completely unaware and unprepared for its impact, according to data released in Shred-it's eighth annual Security Tracker report released 17 May. The research, conducted by…
Enriching Cloud Threat Intelligence and Visibility – Cloud Workload Security and AWS GuardDuty

Enriching Cloud Threat Intelligence and Visibility – Cloud Workload Security and...

Using cloud-native threat intelligence to enhance workload security Risk assessment is crucial in today’s public cloud. In Amazon Web Services (AWS), native monitoring services for ingress and egress network data can shed light on potential network threats and anomalies. A feature of AWS, GuardDuty, bridges the capability to ingest this data to and from an…
US Lacks Policy to Address, Deter Cybercrime

US Lacks Policy to Address, Deter Cybercrime

US Lacks Policy to Address, Deter CybercrimeKey stakeholders in government and private industry experts gathered today in Washington D.C. to talk with Bloomberg News investigative reporter, Michael Riley about The Future of Cybersecurity: Risk and Resilience Across Critical Infrastructure. The discussion was also streamed live and included a panel of four cybersecurity experts who weighed in on…
Privacy Awareness Week-Are We Responsible for Our Data Breach?

Privacy Awareness Week-Are We Responsible for Our Data Breach?

“The best match for me,” announced my daughter one Sunday morning sometime back, “is a Scorpio.” “Oh really? And this piece of vital information no doubt came from Linda Goodman?” I queried, giving her a been-there-done-that look. “Why read when there are multiple sites online that can predict the perfect match for you? You need…
DHS Unveils National Cybersecurity Risk Strategy

DHS Unveils National Cybersecurity Risk Strategy

DHS Unveils National Cybersecurity Risk Strategy The Department of Homeland Security (DHS) unveiled on Tuesday, 14 May, a new national strategy to be implemented to address evolving cybersecurity risks. The DHS strategy outlines strategic and operational goals and priorities to successfully execute the full range of the DHS secretary’s cybersecurity responsibilities. “The strategy is built…

Recent Posts