now browsing by tag


Release Date, Launch, and Why It Could Rule Dating | #facebookdating | #tinder | #pof | romancescams | #scams

Source: National Cyber Security – Produced By Gregory Evans

In the year that’s passed since F8 2018, it appears that Facebook remains undeterred in its quest to become the internet’s matchmaker. At its annual developers conference this week, the […]

The post Release Date, Launch, and Why It Could Rule Dating | #facebookdating | #tinder | #pof | romancescams | #scams appeared first on National Cyber Security.

View full post on National Cyber Security

School Administration Software Market 2020: Potential Growth, Challenges, and Know the Companies List Could Potentially Benefit or Loose out From the Impact of COVID-19 | Key Players: Rediker Software, ThinkWave, PowerVista RollCall, Fedena, RenWeb, etc. | #coronavirus | #kids. | #children | #schools | #parenting | #parenting | #kids

Source: National Cyber Security – Produced By Gregory Evans

School Administration Software Market 2020: Potential Growth, Challenges, and Know the Companies List Could Potentially Benefit or Loose out From the Impact of COVID-19 | Key Players: Rediker Software, ThinkWave, […]

The post School Administration Software Market 2020: Potential Growth, Challenges, and Know the Companies List Could Potentially Benefit or Loose out From the Impact of COVID-19 | Key Players: Rediker Software, ThinkWave, PowerVista RollCall, Fedena, RenWeb, etc. | #coronavirus | #kids. | #children | #schools | #parenting | #parenting | #kids appeared first on National Cyber Security.

View full post on National Cyber Security

#parent | #kids | Stimulus check money: A $1,200 payment could still go out in 2020 | #parenting | #parenting | #kids

Calculate the maximum payment that could end up in your pocket if another stimulus package comes your way. Sarah Tew/CNET Now that the 2020 Republican and Democratic national conventions are history, […] View full post on National Cyber Security

#romancescams | FBI warns people stuck at home could be more vulnerable to online romance scams | romancescams | #scams

They send flowers. They spend months chatting online. They share poems expressing their love. For people forced to stay home during the pandemic, an online connection can offer solace and […] View full post on National Cyber Security

#bumble | #tinder | #pof Trending Reddit Dating Advice Could Be A Lifesaver For Singles | romancescams | #scams

ttps://””> It should be common knowledge now but it’s worth reiterating just for posterity’s sake: looks aren’t everything when it comes to dating – your personality and attitude are crucial […] View full post on National Cyber Security

#cyberfraud | #cybercriminals | Could fighting coronavirus compromise cybersecurity?

Source: National Cyber Security – Produced By Gregory Evans

The COVID-19 pandemic has become a sobering experience in many ways. We are witnessing firsthand the negative impact that a fragmented national public health system has on our safety, health and economy. 

Social isolation has become a stark reality and necessity for people around the globe, including here in the United States. While social distancing has become the operational approach to slow down the spread of the COVID-19 virus (or at least flatten the infection curve), this isolation has ripple effects across other components of our lives. A vast number of people will telecommute and work from home. Schools at the K-12 and university levels are instructing students to stay away from campus and suspending face-to-face teaching. Faculty are moving all classes online. The entertainment and sports industries are canceling events and premiers, and restaurants and bars are closing. Major studios are rushing to push content to streaming services; the list will continue. 

While these responses are prudent, the result is that more of our daily routines are dependent on the internet, internet technologies and telecommunications. This strategy to move to the online cyber and virtual realm, at least in the interim, is happening with no real thought about the cybersecurity implications.

Historically, cybercriminals have used crises to increase criminal activity and scams related to stealing personally identifiable information, as well as financial and personal health Information to defraud victims. Foreign actors have spread disinformation and attempted to disrupt recovery operations as a means of causing more chaos. The same thing is happening and will continue to happen with the COVID-19 crisis. 

We already see cyberattacks against the U.S. Health and Human Services Department, and similar attacks in Europe. Scammers are sending fake emails and setting up fake COVID-19 health information websites, trying to phish user IDs and passwords. Other scammers are pretending to raise money to assist with replacement lunch programs for students or the isolated elderly. No one should be surprised to see a jump in cyber-criminal activity, as these people are opportunistic. We find ourselves in the perfect storm for cyberattacks.

Increased cyberattacks are not the only ripple effect we could see. The telecommunications and mobile network operators’ critical infrastructure must absorb an exponential increase in demand, with little or no ramp-up time. Similar to the public health system, these industries are fragmented and equally unprepared or capable across companies and regions. Internet and mobile network operators will find their resources pushed to the maximum. 

We need only to look at recent natural disasters such as floods and tornadoes to see how fragile this infrastructure is. The ability to communicate either via email or mobile phone with emergency services, loved ones or the media to get information disseminated is essential during a crisis and the ensuing recovery period. 

Social isolation will put a significant burden on the telecommunications and mobile network infrastructure. We will now have millions of people working from home using local or regional providers to connect to company networks. K-12 and university students are trying to resume their studies online using e-learning, placing more burden on networks and the infrastructure. People will increase their use of streaming media for news and entertainment purposes, including on their mobile devices. 

This increased demand will also not follow the regular demand cycles, at least in the foreseeable future — school time, the typical workday and leisure activities no longer have rigid schedules; they will be somewhat blended together. This lack of regular routines could potentially magnify the demand and further negatively impact bandwidth and availability.

We must understand that with our increased dependence on technology and cyber, there are increased risks that we need to be aware of and plan for. Governments, businesses and schools need to provide some direction and advice to the general public on how to follow not only appropriate “anti-COVID-19 hygiene” but also “cybersecurity hygiene.” 

Since networks will now be extended to homes during this time, similar cybersecurity policies, practices and standards that someone would adhere to if they were physically sitting at work or school need to apply.

We may also need to consider metering our online behavior to essential activities such as those related to our work, education or critical communications, or at the very least following the more regular rhythm of the day — routine work or school hours.

We will learn many lessons from the COVID-19 pandemic, and the cost will be high in terms of lives and the economy. Hopefully, when we come out on the other side of this crisis, we will also have a better understanding of how to protect our critical infrastructures and the real risks of living even deeper in cyberspace.

Dr. Marcus Rogers is a professor and executive director of cybersecurity programs at Purdue University; he has over 25 years of experience in public- and private-sector consulting in the area of information technology security, and has consulted for the military, law enforcement and for some of the largest financial and health care providers in the world.

Source link

The post #cyberfraud | #cybercriminals | Could fighting coronavirus compromise cybersecurity? appeared first on National Cyber Security.

View full post on National Cyber Security

#deepweb | A Public Index for the Web? How the Blockchain Could Potentially Fight Deepfakes

Source: National Cyber Security – Produced By Gregory Evans

Over the past two years a cottage industry has emerged of media experts and journalists warning of the potential dangers of “deep fakes.” Videos of Vladimir Putin or Barack Obama saying whatever a video-editor wants them to say have been widely shared on mainstream networks to raise fears over privacy and the dangerous “post-truth” world of the Internet. 

While most mainstream networks have a vested interest in questioning the legitimacy of digital and citizen-led news, there is no doubt that verifying video content is becoming more difficult. 

On the one hand, deep fakes are likely to become a central component of internet culture, fueling the political caricature and memes of tomorrow. On the other hand, there is a darker side. It’s not unrealistic to envision a future in which videos from inside Syria or a protest in Iraq are doctored in a way that could alter our understanding of key events.

It’s not unrealistic to envision a future in which videos from inside Syria or a protest in Iraq are doctored in a way that could alter our understanding of key events.

The blockchain may have a solution. According to Amy James of Alexandria Labs, one of the fundamental problems of the web is that there is no public index. Today when we search the web, we’re searching a private index. This makes detecting changes to search rankings, or the de-platforming of certain ideas and even individuals, very difficult to determine.

Amy James of the’Open Index Protocol’ explains how a distributed global index for the web could help fight deepfakes.

There’s also a less obvious reason why a public index might be a good idea. James argues that “because the web doesn’t have a transparent, secure and version-controlled index it can be difficult to discern truth from fiction online.”

“the web was intended to be fully decentralised.”

On a blockchain immutable index in which every ‘transaction’ is public and recorded, it should be easier to notice when a video is first uploaded and edited, or if different versions of the exact same video are in existence. 

James adds “the web was intended to be fully decentralised.” The apps we all know and love – from Spotify, to Netflix – provide customization and allow networks to scale. At the same time, “private companies build the walled garden infrastructure that we have today so the web could scale and be convenient.” While this model maybe profitable, it centralizes information and control in the hands of closed platforms. “When the web was developing in the early 90s the technology didn’t exist yet to build an index as an open standard protocol,” states James.

“When the web was developing in the early 90s the technology didn’t exist yet to build an index as an open standard protocol”

Alexandria Labs believes the future is a “fully decentralized open protocol for indexing and distribution.” Instead of artificial barriers to content access, an open-source and decentralized protocol would index all public data on the Web, recording it on the blockchain. That’s one way of figuring out if a video of Nancy Pelsoi drunk is actually real. 

Full disclosure: Al Bawaba is exploring blockchain solutions on the Open Index Protocol. 

Source link

The post #deepweb | <p> A Public Index for the Web? How the Blockchain Could Potentially Fight Deepfakes <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#deepweb | More than 200 million MGM customers could have stolen info on the black market

Source: National Cyber Security – Produced By Gregory Evans

MGM RESORTS SAYS THERE WAS A DATA BREACH IN JULY 2019 — Morgan & Morgan has filed a lawsuit against MGM Resorts International over a data breach that has exposed the personal information of millions of people. The lawsuit was filed February 21, 2020 and states that in July of 2019, MGM’s computer network system was hacked. The stolen information was then posted on a closed Internet forum.

Related: Attorney files lawsuit against MGM Resorts over recent data breach

The report states more than 10.6 million MGM guests were impacted, but one of the lead attorneys said it could be much more.

“We absolutely have heard that we could be talking upwards of 200 million plus,” said Attorney Jean Martin.

She said one of their main concerns is what information was stolen. She said initially, MGM reached out to impacted customers in September of 2019, saying only names and maybe addresses had been posted online, but that information had been taken down. However in February, the lawsuit says even more personal information had been posted on an internet hacking forum, leading to prolonged risk of that stolen information spreading. Some of the information stolen included names, addresses, driver’s license numbers, passport numbers, military ID numbers, phone numbers, emails and birthdays.

“That’s what happens when your information is compromised. You never know when it’s going to go up on the web and on the dark web, when it’s going to be sold and when it’s going to be used, so now the people that have had their information compromised face this risk for the rest of their lives,” said Martin.

MGM Resorts released a statement prior to the lawsuit’s filing, and declined to give any updated information.

“Last summer, we discovered unauthorized access to a cloud server that contained a limited amount of information for certain previous guests of MGM Resorts. We are confident that no financial, payment card or password data was involved in this matter. MGM Resorts promptly notified guests potentially impacted by this incident in accordance with applicable state laws. Upon discovering the issue, the Company retained two leading cybersecurity forensics firms to assist with its internal investigation, review and remediation of the issue. At MGM Resorts, we take our responsibility to protect guest data very seriously, and we have strengthened and enhanced the security of our network to prevent this from happening again.”

Source link

The post #deepweb | <p> More than 200 million MGM customers could have stolen info on the black market <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#cybersecurity | #hackerspace | The Washington State Privacy Act Could Be More Comprehensive Than the CCPA

Source: National Cyber Security – Produced By Gregory Evans

Washington state could be next in line to pass a state-wide consumer privacy law in the absence of a federal mandate. 

In January, a bipartisan group of legislators introduced the Washington Privacy Act (WPA) and Senator Reuven Carlyle, who sponsored the bill, discussed why the senators believe the bill is important: “It has never been more important for state governments to take bold and meaningful action in the arena of consumer data privacy. That’s what this legislation does.”

The WPA is, in some ways, similar to some of the most recognizable privacy acts, such as CCPA and GDPR. In fact, the bill borrows many practices from those same bills. However, it differs in some significant ways, and, if it passes, it will be the most comprehensive privacy law in the US.

What’s notable about the WPA is the ripple effects it could create down businesses’ supply chains: The WPA not only stipulates data protection responsibilities for organizations which determine the purposes and means of data processing (“controller”), it also requires these organizations to verify that their vendors (“data processor”) have sufficient data protection mechanisms in place to process personal data safely.

Regardless of whether or not this particular piece of legislation passes, it’s important for businesses to understand the WPA and what it represents: individual states are thinking about and passing legislation requiring businesses to address consumer privacy and data protection. As more states pass these kinds of laws, the burden on businesses to comply with them will continue to grow. 

What businesses would need to be WPA compliant?

As it is written currently, the WPA would apply to two categories of companies that conduct business in or target consumers in Washington:

  1. Businesses that control or process personal data of 100,000 or more consumers.
  2. Businesses that derive greater than 50% of gross revenue from the sale of personal data and processes, and control or process the personal data of 25,000 or more consumers.

Notably, this means that the WPA would apply to some of the biggest businesses in the country, such as Amazon and Microsoft. But it would also apply to little known data brokers and retail stores. 

The WPA focuses on two groups: The first is controllers — businesses or individuals who decide how and for what purposes personal data is processed. For example, a business that collects data and uses it to send targeted ads or email marketing would be a controller.

The other group is processors — businesses or individuals that do not make decisions about how data is used and only process it as directed by the controller. A credit card processing company is a good example of a processor; they don’t collect or make decisions about the data, they just process it for the controller.

What rights does the WPA give consumers? 

Under the WPA, consumers have certain rights when it comes to their personal data. These rights include:

Right of access: The right of a consumer to know if a controller is processing their personal data and to access that personal data.

Right to correction: The right of a consumer to correct their personal data.

Right to deletion: The right of a consumer to request that their data be deleted.

Right to data portability: The right of a consumer to obtain their personal data in a portable and, as much as technically feasible, readily usable format.

Right to opt out: The right of a consumer to opt out of having their personal data processed for targeted advertising, the sale of their personal data, or profiling in furtherance of decisions that produce legal or significant effects on the consumer.

Individuals would not be able to bring lawsuits against companies for breaking the law, but the state Attorney General’s Office would be able to pursue violations under the state’s Consumer privacy Act. 


Controller requirements under the WPA

In short, the WPA requires controllers to be more transparent about their data use and to only use consumer data for the purposes they specified when collecting the data. There are a few other specific requirements, but many of them flow into those core purposes.

The WPA creates these specific controller responsibilities:

Transparency: This would require controllers to provide a privacy notice to consumers that includes what personal data is being processed, why it is being processed, how they can exercise their rights, what data is shared with third parties, and what categories of third parties controllers share their data with. Additionally, if the controller sells personal data, they have to “clearly and conspicuously” disclose this and explain how consumers can opt out.

Purpose Specification: Controllers are limited to collecting data that is reasonably necessary for the express purpose the data is being processed for. 

Data Minimization: Data collection must be adequate, relevant, and limited to what the controller actually needs to collect for the specified purpose.

Avoid Secondary Use: Processing personal data is prohibited for any purpose that isn’t necessary or compatible with the specified purpose of collecting or processing the data — unless the controller has the consumer’s consent.

Security: Controllers are required to put administrative, technical, and physical data security policies and processes in place to protect the confidentiality, integrity, and accessibility of the consumer data they are collecting or processing.

Nondiscrimination: Controllers are disallowed from processing personal data in a way that breaks anti-discrimination laws. It also forbids them from using data to discriminate against consumers for exercising their rights by denying them — or providing a different quality of —  goods and services.

Sensitive Data: Processing sensitive data without a consumer’s consent is forbidden.

Minors and Children: Processing personal data of a child without obtaining consent from their parent or legal guardian is prohibited.

Non-waiver of Consumer Rights: Any contract or agreement that waived or limited a consumer’s WPA right is null and void.

Data Protection Assessments: Companies would also be required under the WPA to conduct confidential Data Protection Assessments for all processing activities involving personal data, and repeat the assessments any time there are processing changes that materially increase risks to consumers.

Data controllers must weigh the benefits of data processing against the risks. If the potential risks for privacy harm to consumers are substantial and outweigh the interests, then the controller would only be able to engage in processing with the explicit consent of the consumer. 


Processor requirements under the WPA

Processors’ responsibilities are different than the controllers’ responsibilities, and while the bulk of the WPA is currently on the controller, it does require that processors have the following items in place:

  • Technical and organizational processes for fulfilling controllers’ obligations to respond to consumer rights requests
  • Breach notification requirements
  • Reasonable processes and policies for protecting consumers’ personal data
  • Confidentiality
  • Controller ability to object to subcontractors
  • The ability for controllers to conduct audits

Additionally, processors and controllers must have contracts in place with provisions regarding personal data processing. The required provisions are similar to the GDPR’s data processing requirements.

How does the WPA differ from the CCPA?

While the WPA borrowed heavily from the CCPA in some areas, there are some key differences that make the WPA more comprehensive.

For example, the WPA requires businesses to weigh the risks and benefits posed to the consumer before they process their data. Specifically, covered businesses must conduct data protection assessments for all processing activities involving personal data. 

The WPA also prohibits businesses from exclusively relying on automated data processing to make decisions that could have a significant impact on consumers, which is not included in the CCPA.

Another significant difference is how the WPA addresses facial recognition software. The CCPA treats facial recognition and other biometric data the same as all other personal data, while the WPA has more specific requirements for how controllers and processors must treat facial recognition data. 

Namely, the WPA specifies that, among other things, facial recognition technology must be tested for accuracy and potential bias, controllers must obtain consent for adding a consumer’s face to a database, consumers must be notified in public places where it is happening, and results must be verified by humans when making critical decisions utilizing facial recognition technology.

What are the consequences of non-compliance?


The cost of non-compliance with the WPA

While the CCPA allows individuals to bring action against companies that are noncompliant, the WPA doesn’t have this provision. However, it does give the Washington Attorney General authority to take legal action and enforce penalties of up to $7,500 per violation. This will add up quickly for businesses that have data breaches or are found to be out of compliance with the WPA.

Preparing for the WPA and beyond

Many businesses are already thinking about WPA compliance, and the most forward-thinking businesses are also considering what this means for the future of privacy laws. The WPA is receiving praise from advocate groups such as Consumer Reports as well as tech giants like Microsoft, and many are even calling for further improvements to the bill. 

Even if the WPA does not come to pass, it is likely for other states to pass similar legislations around consumer data privacy. Either way, your organization needs to be prepared to operate in a world where data privacy issues will be continue to be legislated and litigated.

Companies with already mature infosec and privacy practices will have a big head start when implementing WPA-compliant practices.

To prepare for the WPA and future privacy laws, start by understanding what’s required by the existing industry-agnostic data privacy regulations (e.g., CCPA, GDPR). You’ll need to ensure that your privacy policy, data handling practices, security protocols and vendor contracts are compliant with these regulations. Doing so will help your organization be well prepared when new legislation like the WPA goes into effect. 

To learn more about what your organization can do to readily meet common data privacy legislations, check out this article Understanding Data Privacy and Why It Needs to Be a Priority for Your Business.  

Additionally, to help organizations strengthen their security posture and meet regulatory requirements, Hyperproof has published a suite of articles on cybersecurity controls, best practices and standards. Here are a few of the most popular resources on our website: 

Hyperproof’s compliance operations software comes with pre-built frameworks to help you  implement common cybersecurity and data privacy standards (e.g., GDPR, CCPA, SOC 2, ISO 27001) — so you can improve your data protection mechanisms and business processes to readily meet data privacy and data security regulations. Hyperproof not only provides guidance when you implement these compliance standards, it also automates many compliance activities to save you time when adhering to multiple regulations and industry standards. 

If you’d like to learn more about how Hyperproof can help you prepare to meet the WPA as well as existing data privacy laws, please contact us for a personalized demo.

Banner photo by Felipe Galvan on Unsplash

The post The Washington State Privacy Act Could Be More Comprehensive Than the CCPA appeared first on Hyperproof.

*** This is a Security Bloggers Network syndicated blog from Hyperproof authored by Jingcong Zhao. Read the original post at:

Source link

The post #cybersecurity | #hackerspace |<p> The Washington State Privacy Act Could Be More Comprehensive Than the CCPA <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#cybersecurity | #hackerspace | A Well-Equipped Security Team Could Save You Millions of Dollars a Year

Source: National Cyber Security – Produced By Gregory Evans

Data breaches are expensive. By now, most organizations are well aware of this fact. When it comes to resource planning, however, SecOps teams need concrete data to ensure adequate funding is available to handle a breach. 

Taking a look at recent breaches and industry analysis can help. 

The Financial Cost of a Data Breach Is Rising

IBM conducts an annual “Cost of a Data Breach” study as the basis for a global analysis of the cost impact of data breaches. According to the study, the average cost of a data breach in the U.S. is growing:

·  2017: $7.35 million

·  2018: $7.91 million

·  2019: $8.19 million

Between 2017 and 2019, the average financial impact of a data breach at a U.S. based company rose 10 percent. Companies that experience “mega breaches” involving millions of records can expect to pay anywhere from $40 million to $350 million to clean up the mess. 

IBM expects these figures to continue climbing in the coming year. 

What factors impact the cost of a data breach?

A data breach is not limited to a single incident to be mitigated in just a few days. IBM estimates that it takes companies an average of 280 days to fully recover from a breach. Responding to these breaches extends beyond addressing the root cause of the hack. 

Companies must satisfy notification requirements, preserve affected documents and logs, and address potential PR concerns. If the breach involved PHI (protected health information) or identifying information like Social Security Numbers, the response becomes even more complicated. Most companies will need to hire outside legal consultants to ensure a proper response has taken place.

Beyond these immediate issues, companies that experience a data breach will face “long-tail” costs, those occurring beyond a year year after a breach. These costs include class action lawsuits, regulatory fines, and the potential loss of customers who have lost trust in the company. IBM estimates that lost business accounts for 36 percent of the average total data breach cost.

Proactive Companies Fare Better

Not only will the cost of a data breach increase, so will the odds that a given company will experience a breach. 

Companies are more than 30 percent more likely to experience a breach in the coming years, according to IBM. The Herjavec Group estimates that a ransomware attack will affect a new business every 11 seconds by 2021. 

The risk of a data breach is not a vague threat intended to scare companies into investing more in backend security response. The risk is simply the reality companies must overcome to protect their clients’ data and their own future success. Bad actors are here to stay, unfortunately, and they are becoming savvier all the time. 

Still, companies can make proactive decisions to reduce the risk of a data breach. Key actions that can help include:

·  Establishing in-house incident response capabilities

·  Integrating advanced machine-learning AI into security platforms

·  Increased cybersecurity education for all employees

·  Creating DevSecOps teams who address data security from the start of the development process

IBM estimates that the presence of an in-house incident response team has a significant impact on reducing data breach costs. Using incident response teams can reduce the cost of a data breach by an average of 10.5 percent, a figure that can save companies hundreds of thousands of dollars. 

Next Steps

Don’t wait until you’re in response mode to come up with a data security strategy. MixMode’s third-wave, machine-learning AI detects vulnerabilities before they attract bad actors, giving our clients the upper hand when it comes to cybersecurity. 

Why is machine learning better?

Machine learning is a subset of AI that adds automation and intelligence to computer programs. A music platform that can predict which songs and artists a listener will likely enjoy is one example of machine learning at work.

MixMode takes the concept of machine-learning a few steps further. Not only could our context-aware AI make accurate song predictions, but it could also actually create original music compositions in the same vein. 

While today’s hackers and cybercriminals are often well-versed in typical machine-learning AI, MixMode’s unique context-aware AI is a world apart. 

Our platform takes a deep dive into your network to develop a baseline level of knowledge it will use to evaluate network anomalies. The result is at least a 12 percent reduction in the cost of detecting and responding to data breaches. That’s what happens when SecOps teams don’t have to wade through a mountain of false positives to address real issues. 

Learn how MixMode can ensure your organization won’t become the next company to make the news thanks to a data breach. Reach out to MixMode today to set up a demo. 

MixMode Articles You Might Like:

Network Data: The Best Source for Actionable Data in Cybersecurity

Using the MixMode query language to integrate with Splunk

3 Cyberthreats Facing Federal and State Governments in 2020

Staying CCPA Compliant with MixMode’s Unsupervised AI

5 Cybersecurity Threats That Will Dominate 2020

Wire Data: What is it Good For?

Yesterday’s SIEM Solutions Can’t Combat Today’s Cyberthreats

Source link

The post #cybersecurity | #hackerspace |<p> A Well-Equipped Security Team Could Save You Millions of Dollars a Year <p> appeared first on National Cyber Security.

View full post on National Cyber Security