SBS CyberSecurity - In The Wild 132
In The Wild - CyberSecurity Newsletter
Welcome to the 132nd issue of In The Wild, SBS’ weekly CyberSecurity newsletter. The objective of this newsletter is to share threat intelligence, news articles that are relevant, new and updated guidance, and other information you may find helpful.
Below, you will find some of the latest-and-greatest news stories, articles, videos, and links from the past week in cybersecurity. Some of the following stories have been shared by consultants, others by the SBS Institute, and others yet simply been found in the far corners of the Internet. We hope you find the following stories relevant, interesting, and – most of all – useful. Enjoy.
|
Meet Bluetana, the Scourge of Pump SkimmersKrebs on Security
“Bluetana,” a new mobile app that looks for Bluetooth-based payment card skimmers hidden inside gas pumps, is helping police and state employees more rapidly and accurately locate compromised fuel stations across the nation, a study released this week suggests. Data collected in the course of the investigation also reveals some fascinating details that may help explain why these pump skimmers are so lucrative and ubiquitous.
| |
23 Texas Local Governments Hit in "Coordinated Ransomware Attack"ZDNet
Twenty-three local Texas governments have been infected with ransomware last week in what Texas officials have described as a coordinated attack. The attack took place on Friday morning, August 16, US time, when several smaller local Texas governments reported problems with accessing their data to the Texas Department of Information Resources (DIR). DIR officials did not publish a list of impacted local governments. On Friday, the agency couldn't provide an exact number of impacted entities, but a day later, DIR said the number is 23.
| |
7 Can’t-Miss Cybersecurity Lessons From Black HatSecurity Intelligence
As Black Hat USA and DEF CON 2019 draw to a close, the security industry continues to buzz over events from the annual Las Vegas security week. Black Hat and DEF CON sessions served up a shocking amount of internet of things (IoT) vulnerabilities and research on security best practices. Whether you were on the ground on the Las Vegas strip or unable to attend, the biggest stories from these conferences can offer important security takeaways for the enterprise. Here are seven can’t-miss cybersecurity lessons from Vegas security week.
|
Do you know which SBS Institute Certification Programs are coming up? Check out the Certification Calendar and share with your clients. Find Out Here! »
|
| |
I Shared My Phone Number. I Learned I Shouldn’t Have.The New York Times
For most of our lives, we have been conditioned to share a piece of personal information without a moment’s hesitation: our phone number. We punch in our digits at the grocery store to get a member discount or at the pharmacy to pick up medication. When we sign up to use apps and websites, they often ask for our phone number to verify our identity. This column will encourage a new exercise. Before you hand over your number, ask yourself: Is it worth the risk?
| |
Hy-Vee Issues Warning to Customers After Discovering POS BreachZDNet
Supermarket chain Hy-Vee has published a warning to customers this week after staff discovered a security breach on some of its point-of-sale (PoS) systems. The company said that card transactions made at Hy-Vee fuel pumps, drive-thru coffee shops, and restaurants (Market Grilles, Market Grille Expresses, and Wahlburgers) may have been recorded by hackers. "We believe the actions we have taken have stopped the unauthorized activity on our payment processing systems," a Hy-Vee spokesperson said.
| |
Uncomfortable Truths You Must Accept to Be HappyMedium
Recently, I found myself stuck. You know the feeling. My attention was scattered. My energy was low. I was putting minimal effort into my work. But, as I have many times over the years, I returned to the advice a mentor gave me long ago: When you’re overwhelmed, confused, or lack drive, look for the hard truths you’re probably ignoring. Then, make a list. What do you know to be true but wish wasn’t? What do you want to change but know you have to accept?
|
10 Other Interesting Links From This Week
There were too many fantastic reads from this past weeks’ worth of cybersecurity and technology news, so here are a few additional quick-hit links for your reading pleasure:
|
Comments
Post a Comment