T-Mobile’s data breach exposes the personal data of 40 million

T-Mobile’s data breach exposes the personal data of 40 million

T-Mobile, the popular US mobile phone service provider, recently confirmed a data breach affecting 7.8 million current customers and 40 million records from past or prospective customers. The stolen data included customer names, dates of birth, social security numbers, and driver’s license information. Fortunately, subscriber credit card information and other financial details were not affected in the breach.   Even though financial data was spared in the breach, the types of information stolen, along with the vast volume of affected subscribers mean that all T-Mobile subscribers should take immediate action to secure their…

Read More

T-Mobile’s data breach exposes the personal data of 40 million

T-Mobile’s data breach exposes the personal data of 40 million

T-Mobile, the popular US mobile phone service provider, recently confirmed a data breach affecting 7.8 million current customers and 40 million records from past or prospective customers. The stolen data included customer names, dates of birth, social security numbers, and driver’s license information. Fortunately, subscriber credit card information and other financial details were not affected in the breach.   Even though financial data was spared in the breach, the types of information stolen, along with the vast volume of affected subscribers mean that all T-Mobile subscribers should take immediate action to secure their…

Read More

NYC Teachers’ Social Security Numbers Exposed

NYC Teachers’ Social Security Numbers Exposed

High school students who raised the alarm after discovering a severe data breach involving teachers’ personal information say they were ignored for months.  In January, students at Brooklyn Technical High School reportedly stumbled across a Google Drive containing documents uploaded by staff and students at schools across New York City. Among the documents were college recommendation letters, classwork, and parent-teacher conference sign-up sheets. The students could access the files because of a quirk in the school’s education…

Read More

Former New York Observer Editor Re-charged Over Cyber-stalking

Former New York Observer Editor Re-charged Over Cyber-stalking

A former editor of the New York Observer who was pardoned in January for alleged cyber-stalking has been re-charged for a similar, related offense.  New Jersey resident Kenneth Kurson, also known as Jayden Wagner and Eddie Train, was charged on October 23, 2020, with cyber-stalking three individuals and harassing two additional people. His alleged victims include his former wife, her friend, and a doctor employed by Mount Sinai Hospital.  Kurson’s alleged crimes dated back to November and…

Read More

DemonWare Solicits Staff to Deploy Ransomware

DemonWare Solicits Staff to Deploy Ransomware

A cyber-criminal group has been emailing employees and asking them to help attack their own companies with malware.  The insider threat solicitation scheme was discovered by researchers at Abnormal Security. The author of the emails is someone who claims to have links with the DemonWare ransomware group, also known as Black Kingdom and DEMON. “On August 12, 2021, we identified and blocked a number of emails sent to Abnormal Security customers soliciting them to become accomplices in an insider threat…

Read More

4 Viral Apps Risking Your Personal & Smartphone Security

4 Viral Apps Risking Your Personal & Smartphone Security

Mobile phones have gone through an incredible transformation since their inception in the 1970s. Now, the sheer number of applications is dizzying, as are their privacy policies; however, smartphone apps can bring hours of fun and belly laughs, and occasionally, a viral app captures the world’s attention. Don’t let potential risks to your personal information safety ruin all smartphone apps for you. All you need to share and play safely is a few tips to help you identify which apps are OK to use and how to navigate them intelligently.  Check out these four viral apps that…

Read More

4 Viral Apps Risking Your Personal & Smartphone Security

4 Viral Apps Risking Your Personal & Smartphone Security

Mobile phones have gone through an incredible transformation since their inception in the 1970s. Now, the sheer number of applications is dizzying, as are their privacy policies; however, smartphone apps can bring hours of fun and belly laughs, and occasionally, a viral app captures the world’s attention. Don’t let potential risks to your personal information safety ruin all smartphone apps for you. All you need to share and play safely is a few tips to help you identify which apps are OK to use and how to navigate them intelligently.  Check out these four viral apps that…

Read More

Understanding The Importance of Designing for Security

Understanding The Importance of Designing for Security

By Camille Morhardt, Director of Security Initiatives and Communications at Intel, and Tom Garrison, VP and GM of Client Security Strategy and Initiatives at Intel Robust security is a necessary and critical component of achieving a high-quality product. This is obvious when we consider security in a home or safety in a car or an airplane. And it’s the same with computing devices. From the initial architecture formation through the device build process to ongoing…

Read More

Maintaining access control for employees and preventing new hire fraud

Maintaining access control for employees and preventing new hire fraud

Maintaining access control for employees and preventing new hire fraud | 2021-08-20 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Great Resignation hits IT departments and companies are switching strategies

Great Resignation hits IT departments and companies are switching strategies

To ensure business continuity amid high turnover, many CIOs are planning to alter their strategies to make the company “less dependent on employee institutional knowledge,” says PwC. Image: iStock/alphaspirit After a year of layoffs and hiring freezes, companies have increased hiring in recent months. At the same time, a tight labor market and Great Resignation of sorts has companies using deal sweeteners to attract top talent and fill openings. On Thursday, PwC released the results…

Read More
1 2,136 2,137 2,138 2,139 2,140 2,594