Cybersecurity & Espionage Articles
0 Comments
Original Post at Disney.com
The attacker made off with the IP addresses users used to register on the site and, fortunately for affected users, Disney did not store any other personal information such as IP addresses or Social Security numbers. Original Post at TechRepublic.com
Original Post at Softpedia.com
Helton sent phishing emails perpetrating to be Apple and Google to acquaintances, strangers, and even Hollywood celebrities. The emails urged victims to verify their accounts by visiting a link. This URL went to Helton's server where he used a phishing page disguised to look like the real Apple and Gmail login pages. All login credentials entered on this page were then logged on Helton's servers in plaintext. Helton received only six months because he did not leak the pictures keeping them only to himself. Original Post at Dark Reading
The Ponemon Institute and Atlanta law firm Kilpatrick Townsend’s cybersecurity, privacy and data governance practice recently conducted a survey of executives familiar with their organization’s approach to protecting and managing intellectual property and knowledge assets. A startling 60% of those who responded said they believed that at least one or more pieces of their knowledge assets was in the hands of a competitor. Some 74% said it was likely their organization had failed to detect a data breach involving a loss or compromise of a key knowledge asset. Original Post at Softpedia.com
A judge sentenced Chris Correa, former scouting director for the Saint Louis Cardinals MLB baseball team, to four years behind bars for breaking into the private database of the Houston Astros. Original Post at ZDNet.com
After using fake accounts and creating victims, the security team found that three out of four threat actors were willing to negotiate the price they originally demanded. When contacted by the "victims," the cyber attackers would often offer a discount of roughly 30 percent. Original Post at Softpedia.com
The California 9th Circuit Court of Appeals ruled that if a person uses a password willingly shared by someone else, it still constitutes a "hacking" offense in certain circumstances, according to the ancient CFAA (Computer Fraud and Abuse Act) law. |
Cyber-CyI find interesting articles on the web that are simple, down-to-earth, easy to understand, and (hopefully) informative for non-technical readers. Archives
November 2022
Categories |