Hang up the Phone: MFA’s Insecure Reliance on SMS

It’s hard enough to get people to use multi-factor authentication (MFA)—you know, something you know, you have and you are. Most websites, email accounts and other devices are secured (if at all) with a simple user ID (or email address) and password—a… Continue reading Hang up the Phone: MFA’s Insecure Reliance on SMS

Court Greenlights Accenture/Marriott Breach Suit

A court has ruled that Accenture, as a service provider to Starwood, owed a duty to prevent data breaches to Starwood’s customers In September 2018, Bethesda, Maryland-based Marriott International’s subsidiary chain Starwood learned it had been the vi… Continue reading Court Greenlights Accenture/Marriott Breach Suit

Healthcare Ransomware Readiness – What You Need to Do Today, Tomorrow and the Day After

On October 28, 2020, officials from the FBI and the U.S. Department of Homeland Security assembled a conference call with healthcare industry executives warning them about an “imminent cybercrime threat to U.S. hospitals and healthcare providers.” The agencies on the conference call, which included the U.S. Department of Health and Human Services (HHS), warned participants…

The post Healthcare Ransomware Readiness – What You Need to Do Today, Tomorrow and the Day After appeared first on SecurityCurrent.

Continue reading Healthcare Ransomware Readiness – What You Need to Do Today, Tomorrow and the Day After

VA High Court: License Plate Database Not Personal Data

Regulations related to the collection, storage and use of personal data don’t apply to the collection of license plate readings, a court has found, calling privacy regs into question As you drive to George Mason University in Fairfax, Virginia, you ma… Continue reading VA High Court: License Plate Database Not Personal Data

Hunter Biden’s Laptop – Part Deux – Subpoena vs Warrant

A report on Fox News’ website describes the grand jury subpoena issued for the seizure and search of a laptop computer assertedly belonging to former Vice President Joe Biden’s son, Hunter. For all of the intrigue around the contents of the laptop, its provenance, and whether there is or is not evidence of corruption or criminal…

The post Hunter Biden’s Laptop – Part Deux – Subpoena vs Warrant appeared first on SecurityCurrent.

Continue reading Hunter Biden’s Laptop – Part Deux – Subpoena vs Warrant

Blind Mac’s Bluff

There’s currently a controversy around some Hunter Biden emails found on a laptop that he apparently flew from his home in Los Angeles and dropped off with a blind Mac repairman in Wilmington Delaware over a year ago and never picked up. Actually, several controversies — including whether social media like Twitter and Facebook should permit the…

The post Blind Mac’s Bluff appeared first on SecurityCurrent.

Continue reading Blind Mac’s Bluff

Five [Prying] Eyes – Western Democracies Want Weaker Encryption

The government thinks your emails are too secure. And your text messages. Oh, and your messaging apps. In fact, anything that relies on cryptography. Your messages are too secure in transit. And they are too secure when stored. They are too secure on your computers, your phone, in the cloud, in the control of third…

The post Five [Prying] Eyes – Western Democracies Want Weaker Encryption appeared first on SecurityCurrent.

Continue reading Five [Prying] Eyes – Western Democracies Want Weaker Encryption

Incident Response: Pay a Ransom, Go to Jail

Companies that find their files, data or networks locked by a malicious actor demanding an extortion payment now have a new worry in their incident response: The U.S. Department of Treasury. On Oct. 1, the Treasury Department’s Office of Foreign Asset… Continue reading Incident Response: Pay a Ransom, Go to Jail

The High Cost of Reporting a Non-Reportable Data Breach

Can a company be sued for reporting a data breach in which the data was never used and destroyed? In May, cloud provider Blackbaud was the victim of a ransomware attack designed to lock it out of accessing its own data and servers. The company notifie… Continue reading The High Cost of Reporting a Non-Reportable Data Breach

U.S. Requires Servers to Ban TikTok, WeChat Traffic

On Sunday, Sept. 20, Chinese company ByteDance’s TikTok and WeChat die. President Trump’s executive order, which prohibits any “transactions” with ByteDance thereafter, has now been clarified to note that “transactions” include both the transfer of da… Continue reading U.S. Requires Servers to Ban TikTok, WeChat Traffic