Sextortion Lands Inmate in Federal Prison

Sextortion Lands Inmate in Federal Prison

An inmate of the South Carolina Department of Corrections (SCDC) has been sentenced to five years in federal prison for his role in a deadly sextortion scheme. Wendell Wilkins, of Ridgeville, South Carolina, was serving a 12-year sentence for attempted armed robbery when he pleaded guilty to involvement in a cyber-scam to blackmail military members.  Prosecutors alleged 32-year-old Wilkins posed as young women and joined dating sites using smartphones smuggled into the correctional facility. He then allegedly contacted members…

Read More

How to protect your Google search history with extra verification

How to protect your Google search history with extra verification

Google has made it possible for you to password protect your search history within your cloud account. Jack Wallen shows you how. Image: Matjaz Boncina/Getty Images Did you know anyone could walk up to your computer and view your Google search history? Anything you have searched for in Google is visible. Anything. Because Google keeps everything in the cloud, you don’t have to be sitting at your desk and on your web browser to view…

Read More

Teen Crashes Florida School District’s Network

Teen Crashes Florida School District’s Network

A teenage boy from Florida is facing felony charges after carrying out a cyber-attack that knocked 145 schools offline last spring.  The unnamed 17-year-old junior at St. Petersburg High School crashed the entire computer network of the Pinellas County School District in Florida by deploying a distributed denial-of-service (DDoS) attack. His actions caused all the schools in the district to lose internet access on March 22 and 23. According to a search warrant from the St. Petersburg…

Read More

41% of GRC professionals adopting cloud-based technology in post-pandemic recovery

41% of GRC professionals adopting cloud-based technology in post-pandemic recovery

41% of GRC professionals adopting cloud-based technology in post-pandemic recovery | 2021-06-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Cybersecurity: There’s no such thing as a false positive

Cybersecurity: There’s no such thing as a false positive

All alerts mean something, even if it’s just that an employee needs more training. The threat of breach is constant, and those companies who make assumptions about alerts could be in big trouble. Image: kerly chonglor/Shutterstock The topic of false positives in the security realm is one that’s been on my mind lately as a harried system administrator. A false positive entails an alert about a problem which is actually not a problem, is a…

Read More

Scripps Notifying 147K People of Data Breach

Scripps Notifying 147K People of Data Breach

A California healthcare provider is informing more than 147,000 people that their personal data may have been exposed in a recent cyber-attack. Scripps Health, which operates five acute-care hospitals in San Diego, among other facilities, took most of its network offline after detecting a ransomware infection at the beginning of May.  The San Diego–based nonprofit system suspended access to several applications, including MyScripps and scripps.org.  While the majority of Scripps’ network has now been restored, the attack caused…

Read More

Anomali Cyber Watch: Attacks Against Israeli Targets, MacOS Zero-Days, Conti Ransomware Targeting US Healthcare and More

Anomali Cyber Watch: Attacks Against Israeli Targets, MacOS Zero-Days, Conti Ransomware Targeting US Healthcare and More

The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: Agrius, Conti, North Korea, JSWorm, Nobelium, Phishing, Strrat and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed. Trending…

Read More

Microsoft 365: Most Common Threat Vectors & Defensive Tips

Microsoft 365: Most Common Threat Vectors & Defensive Tips

Security pros discuss the most typical ways attackers leverage Microsoft 365 and share their guidance for defenders. (Image: phloxii via Adobe Stock) As more organizations have grown reliant on Microsoft 365, Google Cloud, and Amazon Web Services, cybercriminals have begun to realize that the shift benefits them and are consequently tailoring their attacks to take advantage of the major cloud platforms in use by organizations.  More than 59.8 million messages from Microsoft 365 targeted thousands…

Read More

Prepare your organization for Atlantic hurricane season

Prepare your organization for Atlantic hurricane season

Prepare your organization for Atlantic hurricane season | 2021-06-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2,247 2,248 2,249 2,250 2,251 2,581