As many of you know the risk of being violated on the internet is at an all time high. How can this be possible?

1) Users are still opening emails from unknown sources and providing personal information in return (Phishing Scams)

2) Users are still going home daily and connecting to their network without any passwords. (Unsecured Home Network)

3) Users are still going to public facilities and joining unsecured public wifi.  While connected the access their social media websites, banking institutions and email accounts. (Maybe consider using VPN software)

4) Users are still using simple passwords. (Password Strength – complex pass-phrases are recommended)

5) Users are still using the same password with all of their accounts. (Password Security – Using different passwords or phrases is best. Please consider changing them on a frequent basis)

6) Users are still failing to protect devices or data (Data or Drive Encryption is recommended)

7) User are still failing to protect devices with reliable security software (Using items such as regularly updated Anti-Virus Software and Malware Protection Software.)

It all starts with the user. Spending a little time on the above items might be a game changer. I recommend doing so before your most sensitive data or financial information is out for the world to see.

Advertisements

Click here to read the article.

 

The University of Maryland on Friday morning detailed the credit monitoring it is offering anyone affected by a computer security attack on the school that compromised hundreds of thousands of personal records.

The security breach early Tuesday morning exposed the names, Social Security numbers, dates of birth and university identification numbers for 309,079 people affiliated with U-Md. on its College Park and Shady Grove campuses. The attack targeted a secure database that holds information from as far back as 1998.

Posted on the washingtonpost.com

A credit card data breach had been detected that exposed guests at certain Marriott, Holiday Inn, Sheraton and other hotel properties to theft, hotel management firm White Lodging Services Corp said on Monday.

The breach occurred at food and beverage outlets at 14 hotels, including some operated under the Westin, Renaissance and Radisson names, between March 20 and December 16 of last year, White Lodging said in a statement.

The company said information subject to potential theft by cyber criminals included names and numbers on consumers’ debit or credit cards, security codes and card expiration dates.

Customers who used their cards at the affected outlets should review all statements from the time in question and consider placing fraud alerts on their credit files, White Lodging said.

Click here to read the whole story – posted at reuters.com

Yahoo called for a re-set of affected email accounts

Company apologized for the attempted hack

Click here to read the whole story, posted at theguardian.com

Hackers for hire and some of their customers have been arrested in a international crackdown on email hacking services.

Eleven people across four nations have been arrested in connection with email-hacking websites following a coordinated sting by law enforcement in the US, Romania, India, and China.

Prosecutors in the US filed four separate cases against five US-based defendants last week, accusing them of either buying or selling email account credentials on the website needapassword.com.

Two men from Arkansas each face up to five years in prison for running a rent-a-hacker service in which customers would supply email addresses that the pair would compromise.

According to a statement by the US Attorney’s Office, customers would make payments to the operators’ PayPal accounts in the scheme, which has affected 6,000 email accounts and was by far the largest of the operations caught in the sting.

Separately, three US-based buyers who collectively spent over $23,000 on email hacking services face misdemeanor offences for hiring the hackers.

Click here to read the whole story posted on zdnet.com

January 25, 2014

To Our Valued Michaels Customers:

As you may have read in the news, data security attacks against retailers have become a major topic of concern. We recently learned of possible fraudulent activity on some US payment cards that had been used at Michaels, suggesting we may have experienced a data security attack.

We are working closely with federal law enforcement and are conducting an investigation with the help of third-party data security experts to establish the facts. Although the investigation is ongoing, based on the information we have received and in light of the widely reported criminal efforts to penetrate the data systems of US retailers, we believe it is appropriate to notify our customers that a potential issue may have occurred.

Click here to read the whole story as reported on cnet.com