How to protect your T-Mobile account in light of the latest data breach

How to protect your T-Mobile account in light of the latest data breach

In response to a breach that compromised the personal data of millions of subscribers, T-Mobile customers should change their password and PIN and set up two-step verification. A cyberattack against T-Mobile has resulted in the theft and compromise of certain personal data of almost 50 million people. This week, the carrier acknowledged a major data breach in which cybercriminals obtained the first and last names, dates of birth, Social Security numbers (SSNs) and driver’s license/ID…

Read More

Anti-Money Laundering Fines Fall by 50% in 1H 2021

Anti-Money Laundering Fines Fall by 50% in 1H 2021

Global fines for anti-money laundering (AML) and data privacy compliance breaches have fallen by nearly 50% year-on-year in the first half of 2021, but could bounce back quickly as financial crime continues apace, according to Fenergo. The digital transformation company claimed that 85 individual fines were levied on global financial institutions for breaches of AML, Know Your Customer (KYC) and data privacy laws in the first six months of 2021 — a drop of 26% on…

Read More

Man Gets Three Years for Stealing Nude Photos from College Victims

Man Gets Three Years for Stealing Nude Photos from College Victims

A New York man has been sentenced to three years behind bars after stealing nude images of dozens of female victims whose social media accounts he hacked. Nicholas Faber, 25, of Rochester, pleaded guilty back in February to one count of computer intrusion causing damage and one count of aggravated identity theft. From around 2017 to 2019, Faber admitted to working with co-conspirator Michael Fish to access the email accounts of dozens of female college…

Read More

Crunch Time for Liquid as Cryptocurrency Exchange Loses $97m to Hackers

Crunch Time for Liquid as Cryptocurrency Exchange Loses m to Hackers

A Japanese cryptocurrency exchange is estimated to have lost $97m after threat actors targeted the company. Tokyo-headquartered Liquid revealed the incident on Thursday evening local time. “We are sorry to announce that #LiquidGlobal warm wallets were compromised, we are moving assets into the cold wallet,” it said in a brief update. “We are currently investigating and will provide regular updates. In the meantime, deposits and withdrawals will be suspended.” According to London-based blockchain analysis company Elliptic, the cyber-thieves…

Read More

Confronting your fear of ransomware

Confronting your fear of ransomware

Confronting your fear of ransomware | 2021-08-20 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

How US security teams can learn from the events of the Manchester Arena terror attack and the subsequent Protect Duty

How US security teams can learn from the events of the Manchester Arena terror attack and the subsequent Protect Duty

How US security teams can learn from the events of the Manchester Arena terror attack and the subsequent Protect Duty | 2021-08-20 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of…

Read More

The Cost of a Data Breach Report: Key Highlights | The State of Security

The Cost of a Data Breach Report: Key Highlights | The State of Security

IBM’s Cost of a Data Breach Report 2021 analyzed 537 real breaches and conducted nearly 3,500 interviews to uncover the true cost of a data breach in 2020. The publication covers initial attack vectors, how long it took organizations to discover and contain braces, as well as the effects that incident response efforts and artificial intelligence have on mitigating breach costs. Key Highlights Now in its 17th year of producing this report, IBM continues to…

Read More

McAfee Security Alert: Protect Your Smart Cameras and Wi-Fi Baby Monitors

McAfee Security Alert: Protect Your Smart Cameras and Wi-Fi Baby Monitors

An important alert for anyone who uses smart cameras, Wi-Fi baby monitors, and other connected  devices that send audio or video over the internet: a recent security advisory indicates millions of these devices may be at risk of remote monitoring or attack.  The root of the concern is an apparent vulnerability in the Software Development Kit (“SDK”) used with the ThroughTek Kalay network. Millions of smart devices use Kalay and its protocols to communicate over the internet.  As mentioned in the security advisory, an attacker could exploit the apparent vulnerability to intercept audio and video signals sent to…

Read More

McAfee Security Alert: Protect Your Smart Cameras and Wi-Fi Baby Monitors

McAfee Security Alert: Protect Your Smart Cameras and Wi-Fi Baby Monitors

An important alert for anyone who uses smart cameras, Wi-Fi baby monitors, and other connected  devices that send audio or video over the internet: a recent security advisory indicates millions of these devices may be at risk of remote monitoring or attack.  The root of the concern is an apparent vulnerability in the Software Development Kit (“SDK”) used with the ThroughTek Kalay network. Millions of smart devices use Kalay and its protocols to communicate over the internet.  As mentioned in the security advisory, an attacker could exploit the apparent vulnerability to intercept audio and video signals sent to…

Read More

McAfee Security Alert: Protect Your Smart Cameras and Wi-Fi Baby Monitors

McAfee Security Alert: Protect Your Smart Cameras and Wi-Fi Baby Monitors

An important alert for anyone who uses smart cameras, Wi-Fi baby monitors, and other connected  devices that send audio or video over the internet: a recent security advisory indicates millions of these devices may be at risk of remote monitoring or attack.  The root of the concern is an apparent vulnerability in the Software Development Kit (“SDK”) used with the ThroughTek Kalay network. Millions of smart devices use Kalay and its protocols to communicate over the internet.  As mentioned in the security advisory, an attacker could exploit the apparent vulnerability to intercept audio and video signals sent to…

Read More
1 2,137 2,138 2,139 2,140 2,141 2,594