Tag Archives: cyber risk

Vehicle Automation Susceptible to DoS Attacks

Self driving cars are pretty darn cool, but so are cybersecurity attacks against them. Like stopping them in their tracks with a laser pointer. No kidding! Security researcher, Dr. Jonathan Petit, (English version of little john… lol) points out the … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Vehicle Automation Susceptible to DoS Attacks

No Awareness? $683,000 is the Average Loss

Organizations that do not have security awareness programs – particularly, training for new employees – report significantly higher average financial losses from cybersecurity incidents. Companies without security training for new hires reported average annual financial losses of $683,000, while those … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on No Awareness? $683,000 is the Average Loss

Cyber Kidnapping

Of course, while dramatized for prime time audiences, the CSI: Cyber series, starting with episode 1 does have great information that is all too real. The show is available online right now here. I first wrote about baby monitors getting … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Cyber Kidnapping

Uber Accounts, $1

Stolen Uber Customer accounts are for sale on the Dark Web for the low price of $1.00. Though most of the credit cards are masked, the last four and the expiration date are still available. The rest of the data … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Uber Accounts, $1

150,000 Records Accessed in Advantage Dental Breach

Compromised data included names, Social Security numbers, birthdays, phone numbers and home addresses, but not treatment or financial information. The information was accessed between Feb. 23-26, when Advantage’s internal IT specialists detected the security breach.   So far, no patients … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on 150,000 Records Accessed in Advantage Dental Breach

Would You Buy Your Kids A “Hello Barbie” Doll?

Most kids like to talk to their toys, it’s not uncommon. As far back as I can remember, like many children, I’d play with toys and do voices for them, or ask them questions on behalf of other toys, playing out … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Would You Buy Your Kids A “Hello Barbie” Doll?

SaveMe App is Actually SocialPath Malware for Android Phones

The Save Me app claims to be able to save a user’s contacts and other data including photos and videos, in the event that a mobile device is lost or stolen but it actually contains a variant of information-stealing malware … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on SaveMe App is Actually SocialPath Malware for Android Phones

Smartwatch to Smartphone Data Interception

Data sent between a Smartwatch and an Android smartphone could be a subject to brute force hacks to intercept and decode users’ data, including everything from text messages to Google Hangout chats and Facebook conversations. Liviu Arsene explains. Read more … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Smartwatch to Smartphone Data Interception

Breaches, Attacks, and Vulnerabilities in October 2014

This might be the longest one I’ve done so far: List of data breaches and cyber attacks in October http://t.co/AtYQ3vBJEa — Lewis Morgan (@LewisMorgan_) October 28, 2014 Payment information breach Dairy Queen Data breach hits 395 stores ‘Big K’ raided … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Breaches, Attacks, and Vulnerabilities in October 2014

Many IoT devices run embedded Linux distributions with Bash

I’m not trying to perform a Chicken Little, but outside of corporate data centers, where the average home owner with some cool computerized toys who doesn’t perform regular updates, is very vulnerable and prone to privacy loss. Some devices are … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Many IoT devices run embedded Linux distributions with Bash