Borderline Unreasonable Electronic Device Searches

It has long been the law that searches – of one’s person, places, houses and effects – without probable cause and a warrant are presumptively unreasonable. Moreover, searches of electronic devices, which contain massive amounts of intimate… Continue reading Borderline Unreasonable Electronic Device Searches

The Week in Breach News: 03/03/21 – 03/09/21

Third party risk explodes from Microsoft, hackers fly into SITA, phishing risks are up + get our St.Pats infographic with lucky security tips!
The post The Week in Breach News: 03/03/21 – 03/09/21 appeared first on Security Boulevard.
Continue reading The Week in Breach News: 03/03/21 – 03/09/21

SMBs need to take immediate action on Microsoft Exchange vulnerabilities

There’s been a lot in the news recently about a new series of vulnerabilities affecting Microsoft Exchange and attacks against those vulnerabilities. According to security writer Brian Krebs, over 30,000 organizations in the United States — and possib… Continue reading SMBs need to take immediate action on Microsoft Exchange vulnerabilities

SMBs need to take immediate action on Microsoft Exchange vulnerabilities

There’s been a lot in the news recently about a new series of vulnerabilities affecting Microsoft Exchange and attacks against those vulnerabilities. According to security writer Brian Krebs, over 30,000 organizations in the United States — and possib… Continue reading SMBs need to take immediate action on Microsoft Exchange vulnerabilities

Wall Street targeted by new Capital Call investment email scammers

Business Email Compromise (BEC) scammers, who have made rich returns in recent years tricking organisations into transferring funds into their accounts, have found a new tactic which attempts to swindle Wall Street firms out of significantly larger amo… Continue reading Wall Street targeted by new Capital Call investment email scammers

HIPAA Security Requirements: What They Really Mean

The University of Texas M.D. Anderson Cancer Center was having a hard time protecting patient electronic health information. In 2012, an employee’s laptop, containing ePHI for about 30,000 patients was stolen. The same year, a trainee lost an unencryp… Continue reading HIPAA Security Requirements: What They Really Mean

The Week in Breach News: 02/24/21 – 03/02/21

Bombardier and Steris get caught up in a third-party data breach, Cryptopia gets hacked again and see what huge percentage of data breaches are caused by email!
The post The Week in Breach News: 02/24/21 – 03/02/21 appeared first on Security Boulevard.
Continue reading The Week in Breach News: 02/24/21 – 03/02/21

Unknown Hacker Grabs Gab’s Data, DDoSecrets Doesn’t Leak it

Gab has been hacked. The app fell “victim” to a simple SQL injection attack. But the CEO’s response was a trans-phobic slur.
The post Unknown Hacker Grabs Gab’s Data, DDoSecrets Doesn’t Leak it appeared first on Security Boulevard.
Continue reading Unknown Hacker Grabs Gab’s Data, DDoSecrets Doesn’t Leak it

The Ransomware Group Tactics which Maximise their Profitability

Article by Greg Foss, Senior Cyber Security Strategist, VMware Carbon Black

Wherever there is disruption, cybercriminals see opportunity. Alongside the devastating health and economic impacts of the global coronavirus pandemic, we have also seen a hu… Continue reading The Ransomware Group Tactics which Maximise their Profitability

The Week in Breach News: 02/17/21 – 02/23/21

Ransomware hit Kia and UL, Simon Fraser U is back, 2 phishing traps that employees fall for and the value of improving cyber resilience.
The post The Week in Breach News: 02/17/21 – 02/23/21 appeared first on Security Boulevard.
Continue reading The Week in Breach News: 02/17/21 – 02/23/21