Learn the steps to take in the event of a data breach and stay current on the cyber threat landscape with the FTC’s Data Breach Resources, FBI’s Daily Digest Library and San Diego’s Cyber Incident Response Guide.
Federal Trade Commission (FTC) Data Breach Resources
Find out the steps to take as a business or consumer if you experience a data breach.
FBI Cyber Daily Digest Library
Stay current on the global threat landscape with the FBI’s daily circulation of published data breaches and articles.
Fraud Is Eroding The Customer Experience
- It wasn't that long ago that my mother finally started using Amazon.com to make purchases.
- She was afraid someone would steal her credit card and other valuable information.
- Trust and confidence are a big part of the customer experience. You want your customers to feel comfortable and confident about doing business with you.
Forbes - Shep Hyken | January 12, 2020
6 Essential Questions To Ask While Facing A Security Breach
- You should not panic if you observe a breach of data in your computer network systems.
- You should instead look forward to taking necessary defenses and actions against the offense, but before that, you must ask six questions to yourself.
Entrepreneur India - Remesh Ramachandran | January 8, 2020
City of Las Vegas wakes up to a cyber attack
- In the early hours of Tuesday morning, city officials in Las Vegas were alerted that their computer network had suffered a security breach.
- If it is a ransomware attack that has hit Las Vegas then the cybercriminals may be out of luck if they're hoping that the city will pay up.
- In July last year, Las Vegas's mayor was a driving force behind a resolution from the United States Conference of Mayors (USCM), agreeing to "stand united against paying ransoms in the event of an IT security breach."
Graham Cluley | January 8, 2020
Smart home security makes a big splash at CES 2020
- Smart home security systems have been problematic for some time now.
- The most notable attack occurred when these devices along with other internet of things (IoT) gadgets were used to conduct a number of distributed denial of service (DDoS) attacks on the internet, crippling several websites including PayPal, Twitter, Amazon, Netflix, Spotify, Reddit and more.
Electronics 360 - Peter Brown | January 8, 2020
Unveiling the top hacking methods across industries
- In light of cyberattacks globally and across industries, Specops Software released a report with a breakdown of how the nature of cybercrime can change across industries.
- One method is clickjacking--a malicious technique that tricks users into clicking an invisible or disguised element on the website to perform unintended acts. This form of hacking accounts for 66 percent of attacks in the education domain.
TechHQ - Jia Jen Low | January 7, 2020
Disk-wiping malware, phishing and espionage: How Iran's cyber attack capabilities stack up
- Iranian leaders have vowed to retaliate against the US, with the US Department of Homeland Security warning that previous Iranian plans have included "cyber-enabled" attacks against a range of US targets.
- One of the Iranian groups, known as APT33, has spent years developing sophisticated payloads with Powershell implants exploits, which could allow them to potentially meddle with critical infrastructure like financial systems or industrial control systems.
ZDNet - Steve Ranger | January 7, 2020
Ring updates privacy features in wake of data breach
- Ring, the Amazon-owned company that provides home security services, is updating its privacy features in the wake of a recent data breach.
- Ring says new privacy and security settings have been developed and will be added to users' dashboards in the weeks ahead. The new security features should be available for both iOS and Android users by the end of the month.
Consumer Affairs - Mark Huffman | January 7, 2020
The Iran Cyber Warfare Threat: Everything You Need To Know
- When news emerged that Iranian general Qassem Soleimani had been killed in a U.S. airstrike on January 3, speculation about an imminent cyberattack was rife.
- And for a short moment in the early hours of Sunday, it seemed like the first Iranian-led cyberattack might have arrived.
- The Federal Depository Library Program website had been defaced by hackers claiming to be working for the Iranian government.
- But there was no proof to link the hackers to Iran.
Forbes - Kate O'Flaherty | January 6, 2020
The types of data you really don't want stolen in a hack
- About a year after Equifax's monster security breach that compromised 147 million people's data, more news came out about exactly how damaging the hack was for those involved.
- According to Jason Glassberg, co-founder of Casaba Security, your Social Security number is probably the worst thing to get compromised, and it was the most affected part of the Equifax breach.
- It's very difficult to get a new Social Security number, though it is possible.
- According to the Social Security Administration, it "may assign a new Social Security number to you if you are being harassed, abused, or are in grave danger when using the original number, or if you can prove that someone has stolen your number and is using it."
Yahoo! Money - Ethan Wolff-Mann | January 6, 2020
After data breach, should Wawa bosses get the Target treatment?
- What happens to executives of retail companies such as Wawa Inc. when they acknowledge a data breach that exposed customer data that should have stayed private?
- Pennsylvania, where Wawa is based, has a more conditional data breach notification requirement: A company has to tell customers when it decides the loss of personal information is likely to "cause loss or injury" _ which potentially gave Wawa more time to delay disclosure, according to a data-management company founder who asked that he not be identified by name because he has business ties to Wawa.
Reading Eagle - Joseph DiStefano | January 6, 2020
San Diego Cyber Incident Response Guide
Learn more about San Diego’s region-wide cyber incident response guide and available local, state and federal resources.