Tag Archives: breach

Social Engineering Attack – Breach of Trust

There is an alarming increase in cases of unknown individuals winning the trust of unsuspecting victims in the virtual world and then misusing this trust to commit crimes on the victims. This is the world of the social engineering attack. It starts with information collection regarding a targeted individual.

 

A college girl in Gujarat was asked her mobile number by a co-student. She refused but the co-student coolly replied that he will get it. Next day he had her name, her fathers’ name, her address and her phone number!! How did he get it? By uploading her “Scooty” number on the RTO site of Gujarat.

 

An Income Tax Department site of the Government of India called “e-filling” is another such target. A cyber criminal provides the surname of a person and his date of birth – he can get the PAN card number of a targeted individual. Using this number and a

Read more at: http://morungexpress.com/social-engineering-attack-breach-trust/

Social Engineering Attack – Breach of Trust

There is an alarming increase in cases of unknown individuals winning the trust of unsuspecting victims in the virtual world and then misusing this trust to commit crimes on the victims. This is the world of the social engineering attack. It starts with information collection regarding a targeted individual.

 

A college girl in Gujarat was asked her mobile number by a co-student. She refused but the co-student coolly replied that he will get it. Next day he had her name, her fathers’ name, her address and her phone number!! How did he get it? By uploading her “Scooty” number on the RTO site of Gujarat.

 

An Income Tax Department site of the Government of India called “e-filling” is another such target. A cyber criminal provides the surname of a person and his date of birth – he can get the PAN card number of a targeted individual. Using this number and a

Read more at: http://morungexpress.com/social-engineering-attack-breach-trust/

How to avoid a data breach

Don’t overlook the vulnerability of executives

Lance Spitzner, director, SANS Security Awareness

The vulnerability of senior executives to cyber-attacks is often overlooked. Chief executives are privy to information that’s not widely known within their organisation, making them attractive targets to criminals. Consequently, they can often be imbued with trust, authority and power within the organisation, which can potentially make them a significant liability to the company.

Business Email Compromise (BEC) attacks are when a cyber criminal adopts the identity of a senior executive and sends emails to staff members in an attempt to trick them into doing something that they shouldn’t.

With information about businesses and their employees publicly available on company websites, LinkedIn, Facebook, Twitter and more, these attacks can be very effective.

Trying to avoid this involves enforcing security policies and procedures, authenticating all fund transfers with the finance department (or all data shares with the legal department),
and making

Read more at: http://www.telegraph.co.uk/connect/better-business/cyber-security/how-to-avoid-a-data-breach/

Uber hack: The UK’s top cyber crime and data authorities are investigating the massive data breach

UK authorities have launched an investigation into the massive hack of Uber which left the data of 50m customers vulnerable.

The Information Commissioner’s Office (ICO) has launched a probe of the incident which it said raises “huge concerns” when it comes to ethics and data privacy.

And GCHQ’s National Cyber Security Centre (NCSC) will be looking at

Read more at: http://www.cityam.com/276233/uber-hack-uk-authority-information-commissioners-office

IRS: Equifax breach includes much data crooks already had stolen

x

Embed

x

Share

CLOSE

While IRS reports progress on cracking down on tax-related ID fraud, consumers and businesses warned to watch out for con artists who want more of your data.
Susan Tompor, Detroit Free Press

So among other cybersecurity worries, now we’re all wondering how the stolen Equifax data — which includes Social Security numbers — might drive up tax refund fraud. 

But IRS Commissioner John Koskinen said Tuesday that he’s doubtful that the Equifax breach will make a noticeable difference in tax-related ID scams. That’s because a significant amount of that data was stolen through earlier breaches in recent years at major employers, cyber attacks on the healthcare

Read more at: https://www.usatoday.com/story/money/columnist/tompor/2017/10/23/irs-tax-refund-fraudsters-already-had-much-equifax-stolen-data/790732001/

IRS: Equifax breach includes much data crooks already had stolen

x

Embed

x

Share

CLOSE

While IRS reports progress on cracking down on tax-related ID fraud, consumers and businesses warned to watch out for con artists who want more of your data.
Susan Tompor, Detroit Free Press

So among other cybersecurity worries, now we’re all wondering how the stolen Equifax data — which includes Social Security numbers — might drive up tax refund fraud. 

But IRS Commissioner John Koskinen said Tuesday that he’s doubtful that the Equifax breach will make a noticeable difference in tax-related ID scams. That’s because a significant amount of that data was stolen through earlier breaches in recent years at major employers, cyber attacks on the healthcare

Read more at: https://www.usatoday.com/story/money/columnist/tompor/2017/10/23/irs-tax-refund-fraudsters-already-had-much-equifax-stolen-data/790732001/

Millions caught in South Africa’s ‘worst data breach’

Photograph of local website running cyber breach article

Image caption

South Africa has been hit by what is described as the worst data breach in history

Authorities in South Africa are investigating a data breach which has seen the personal details of more than 30 million citizens leaked on the internet – placing them

Read more at: http://www.bbc.com/news/world-africa-41696703

Millions caught in South Africa’s ‘worst data breach’ – BBC News

Photograph of local website running cyber breach article

Image caption

South Africa has been hit by what is described as the worst data breach in history

Authorities in South Africa are investigating a data breach which has seen the personal details of more than 30 million citizens leaked on the internet – placing them

Read more at: http://www.bbc.com/news/world-africa-41696703

IRS: Equifax breach includes much data crooks already had stolen

x

Embed

x

Share

CLOSE

While IRS reports progress on cracking down on tax-related ID fraud, consumers and businesses warned to watch out for con artists who want more of your data.
Susan Tompor, Detroit Free Press

So among other cyber security worries, now we’re all wondering how the stolen Equifax data — which includes Social Security numbers — might drive up tax refund fraud. 

But IRS Commissioner John Koskinen said Tuesday that he’s doubtful that the Equifax breach will make a noticeable difference in tax-related ID scams. That’s because a significant amount of that data was stolen through earlier breaches in recent years at major employers, cyber attacks on the

Read more at: http://www.freep.com/story/money/personal-finance/susan-tompor/2017/10/18/koskinen-tax-scams-insurance-schemes/767460001/

Australian Government Discloses Breach of Defense Supplier’s Computer

 

According to the Australian government, hackers infiltrated certain defense contractor’s PC in 2016. Before launching the yearly threat report of the Australian Cyber Security Center scheduled for October 10, Dan Tehan Assistant Minister for Cyber Security couldn’t confirm the individual’s name behind the hack.

 

Managing to reach the Information Technology network, the intruders remained there for long as they stole vast volumes of data belonging to the defense supplier. When in November 2016, the Australian Cyber Security Center of the federal government became aware of the incident it assisted in halting the attack.

 

Tehan explained that the hacker could be a state-sponsored online thief or a normal cyber-criminal, either way the individual’s behavior prompted serious action. The minister said nothing could be fully confirmed, a usual hazard in this field of cyber-crime. He couldn’t also state the length of time the intruders stayed on the computer. However, according to him, the IT

Read more at: http://www.spamfighter.com/News-21173-Australian-Government-Discloses-Breach-of-Defense-Suppliers-Computer.htm