Here is the weekly roundup :
|
NFL’s Twitter Account Hacked
|
The National Football League’s Twitter account, @nfl, was hacked on Tuesday and the hacker put up a faux tweet stating that the NFL commissioner had died. Some suggest that the streak of recent incidents of account takeovers is linked to the series of recent data breaches - including LinkedIn, Tumblr, MySpace, and others.
|
|
Hackers Target Mark Zuckerberg’s Social Media Accounts
|
The man behind the world’s most popular social networking website, Facebook’s Mark Zuckerberg has had his social media accounts hacked. Apparently, by using the young billionaire's password leaked in the recent LinkedIn data breach.
|
|
Russian Authorities Nab Hacker Gang Behind $25m Cyber-Theft
|
A hacker gang consisting of at least 50 individuals has been apprehended, many of them arrested after allegedly using malware to steal over 1.7 billion roubles ($25 million USD).
|
Interesting Reading From Around the Web
|
These DARPA Darlings Just Raised $20M To Build A Super-Powered Google For The Internet Of Things
|
Governments and private firms which can afford to pay up to $1 million a year for access to Qadium’s Expander browser-based tool, can expect to learn about pieces of their network they never knew existed, as the platform creates links between different pieces of connected hardware spread across the world. They’ll also receive warnings about any hackable machines they own, failing firewalls and unauthorized IT deployments.
|
|
Banks: Credit Card Breach at CiCi’s Pizza
|
CiCi’s Pizza, an American fast food business based in Coppell, Texas with more than 500 stores in 35 states, appears to be the latest restaurant chain to struggle with a credit card breach. The data available so far suggests that hackers obtained access to card data at affected restaurants by posing as technical support specialists for the company’s point-of-sale provider, and that multiple other retailers have been targeted by this same cybercrime gang.
|
|
7 Ways to Combat Personal Ransomware Attacks
|
The Internet Crime Complaint Center has warned of extortion schemes connected to recent high-profile data thefts. In these schemes, fraudsters use the breach news to scare individuals into clicking a malicious link or paying a ransom.
|
Featured Guide
Identity Fraud Guide: All You Need to Know
For credit unions, security isn't just about protecting the vault. It's about shielding sensitive information from determined, increasingly innovative cybercriminals, who continuously probe external defenses and devices. And when it comes to external fraud threats, the size of the financial institution does not matter.
|
Upcomming Events
Securing Active Directory
New York, NY, June 21
More information
Channelnomics
Chicago, IL, June 29
More information
SINET Innovation Summit
New York, NY, July 14
More information
Featured Articles
30 Tech Experts Share Important Steps To Securing Your Smartphone
Dusan Petricko is the Digital Forensics Manager at LIFARS LLC, an international cybersecurity intelligence and digital forensics firm. He has a decade of experience in the information and network security field. Dusan often leads investigations of high-profile cases for Fortune 2000 companies.
Discover How Enterprise Mobile Technology Is Changing
Mobile devices will pose increased cyber risk to enterprises and as a result we will observe an increased focus on mobile security. - Ondrej Krehel, LIFARS
Credit Unions Must Safeguard Sensitive Data Footprint
For credit unions, it is not just about protecting the vault alone, it is about shielding sensitive information from determined and increasingly innovative cybercriminals, who continuously probe external defenses and devices.
Featured Q&A
Identity Fraud Guide: All You Need to Know
For credit unions, security isn't just about protecting the vault. It's about shielding sensitive information from determined, increasingly innovative cybercriminals, who continuously probe external defenses and devices. And when it comes to external fraud threats, the size of the financial institution does not matter.
|