CyberSecurity

By shornik | A collection of stories related to technology vulnerabilities, exploits and preventive controls by Dr. Steven Hornik as curated by University of Central Florida Advanced Accounting Information System graduate students.

Consumers lost $19.4 billion to cybercriminals in 2017

Millennials may be the most connected generation yet, but that doesn’t mean they’re the smartest when it comes to keeping their data safe. According …

Identity Theft

Data Breach Bill Signals Increased Federal Interest in Cybersecurity

Jeffrey SchultzJurisdiction: All FederalType of Law: Communications, Media & Internet

Cybersecurity

‘Password,’ ‘Monkey’ and the Other Terrible Passwords We Choose

The list of this year’s 25 “worst” passwords says a lot about us.<p>“Starwars” (No. 16) reflects a resurgent force in popular culture.<p>“Whatever” (No. 23) and “letmein” (No. 7) seem to speak to an exasperation with online security itself.<p>And “password” (No. 2) speaks to our collective lack of …

Identity thieves may have hacked files of up to 100,000 financial aid applicants

Internal Revenue Service Commissioner John Koskinen said Thursday the information of up to 100,000 taxpayers may have been stolen in a security breach of an online tool used to apply for federal student aid.<p>Testifying before the Senate Finance Committee, Koskinen said the IRS identified suspicious …

Identity Theft

North Korea government-backed hackers are trying to steal cryptocurrency from South Korean users

North Korean government-backed hackers are targeting South Korean cryptocurrency exchange customers using similar tactics to the cyberattack on Sony …

North Korea

Will we ever be able to trust driverless cars?

<b>When you're sitting in the driver's seat at 60mph on a rain-lashed motorway, covering your eyes would normally be a dangerous, if not downright suicidal move.</b><p>Putting on a virtual reality headset, obscuring the view of the road altogether, might seem even crazier.<p>But that's exactly what I did …

Transportation

2018 Olympics: Could computer hacks produce the wrong winners?

Sporting events are only meaningful if we trust the results. But as digital devices proliferate, so will the risks of cybersecurity failures.<p>Imagine if, at next month’s 2018 PyeongChang Winter Olympics, the women’s figure skating competition were to be halted mid-event. Several coaches file a …

Olympics

Elon Musk says preventing a ‘fleet-wide hack’ is Tesla’s top security priority

There were several interesting tidbits of information about Tesla that came out of Elon Musk’s talk at the National Governors Association this weekend, like removing the possibility of a solar roof option on the Model 3 and announcing that 2 or 3 more Tesla Gigafactories are coming to the US.<p>But …

National Governors Association

Cybersecurity Today Is Treated Like Accounting Before Enron

Last week, we learned that researchers had discovered two major flaws in microprocessors of nearly all the world’s computers. The revelation came on the heels of a distressing series of major hacks: In 2017, Yahoo revealed that all of its three billion accounts were compromised, WannaCry ransomware …

Cybersecurity

Data breach hits Orlando-area Jason's Deli locations

Jason's Deli says dozens of locations were targeted in a data breach, and five Orlando-area locations are on the list.• <b>Up to 2M customers affected by</b> …

Identity Theft

Two-Factor Authentication: Who Has It and How to Set It Up

Everyone is concerned about online safety. Whatever you use, keep it secure with two-factor authentication (2FA).<p>PCMag reviews products …

Cybersecurity

Get a webcam cover and ease your anxieties about internet privacy and creepy online hackers

Heads up: All products featured here are selected by Mashable's commerce team and meet our rigorous standards for awesomeness. If you buy something, …

Privacy

BlackWallet cryptocurrency site loses users’ money after DNS hijack

Another site in the booming cryptocurrency wallet sector has been hacked after what looks like a DNS hijacking attack.<p>The victim this time is …

Information Security

Cyber security: mind the (skills) gap

The development of cyber security skills is simply not keeping pace with digital and technological expansion – a lack which cyber criminals are …

Cybersecurity

How Google Fights Password Thieves

Google and researchers at the University of California, Berkeley, teamed up to study how Google accounts become compromised, shedding light on how …

Security

Skygofree — Powerful Android Spyware Discovered

Security researchers have unveiled one of the most powerful and highly advanced Android spyware tools that give hackers full control of infected …

Beware! A new bug can crash iOS and macOS with a single text message

Resist the temptation to send this text bomb to anyone.<p>Author:<p>Published<p>in Apple, iOS, macOS, Vulnerability 0<p>Be careful what you click on.<p>Abraham …

iOS

How To Keep Personal Data Safe When Companies Can't (Or Won't)

Organizations came under fire in 2017, a year of reckoning for businesses on how they managed corporate and personal data. The increase in …

Identity Theft

Ominous Processor Vulnerabilities Could Put Most Computers at Risk | Cybersecurity

Nearly a dozen cybersecurity researchers this week reported two potentially serious exploits of vulnerabilities that exist in most modern …

Information Security

Who should be responsible for cybersecurity?

The news today is flush with salacious stories of cyber-security breaches, data held hostage in brazen ransomware attacks, and compromised records …

Cybersecurity

Skype's Rolling Out End-to-End Encryption For Hundreds of Millions of People

Skype has more than 300 million monthly users, making it one of the most popular chat platforms in the world. Now, they'll all be able to benefit …

Encryption

Pentagon Suggests Countering Devastating Cyberattacks With Nuclear Arms

WASHINGTON — A newly drafted United States nuclear strategy that has been sent to President Trump for approval would permit the use of nuclear weapons to respond to a wide range of devastating but non-nuclear attacks on American infrastructure, including what current and former government officials …

War

North Korea linked to new cryptocurrency attacks

North Korea-linked hackers targeted cryptocurrency investors and exchanges just as bitcoin started to soar to record highs, according to a new report.<p>Cybersecurity firm Recorded Future said malware used in the attacks was similar to that used in the Sony Pictures hack, the global WannaCry …

North Korea

Inside Uber’s $100,000 Payment to a Hacker, and the Fallout

SAN FRANCISCO — “Hello Joe,” read the November 2016 email from someone identifying himself as “John Doughs.” “I have found a major vulnerability in Uber.”<p>The email appeared to be no different from other messages that Joe Sullivan, Uber’s chief security officer, and his team routinely received …

Security

A password for the Hawaii emergency agency was hiding in a public photo, written on a post-it note

• <b>A false alarm was broadcast to Hawaii on Saturday warning of an inbound missile.</b>• <b><br>In the days following the alert, people discovered that a photo taken in Hawaii's Emergency Management Agency for a newspaper article in July includes a sticky note with a password on it.</b>• <b><br>Hawaii says the false alarm was</b> …

Security

Cloud security is not just the cloud vendor’s responsibility

A lot has been said about the security risks of moving your data or systems to the cloud. Choosing trustworthy cloud vendors, preferably with the …

Cybersecurity

Hospital pays $55,000 in bitcoin to hackers after 'SamSam' ransomware locks systems

Hackers, believed to be based in Eastern Europe, infected systems on 11 January.<p>'SamSam' ransomware encrypted 1,400 files and demanded bitcoin be …

Security

Car hacking remains a very real threat as autos become ever more loaded with tech

Automakers and suppliers are making progress in protecting vehicles from cyber attacks, but the car-hacking threat is still real and could get increasingly serious in the future when driverless vehicles begin talking to each other.<p>A worst-case scenario would be hackers infiltrating a vehicle …

Transportation