Cyber Security in Delaware
 

SECURITY NEWS

Ohio Enacts First Cybersecurity Safe Harbor

11/07/2018

Effective November 2, 2018, Ohio's Data Protection Act (DPA) has been supplemented with an incentive-based mechanism to strengthen cybersecurity business practices.

Internet-Exposed HMIs Put Energy, Water Facilities at Risk: Report

10/30/2018

Malicious actors could cause serious damage to organizations in the energy and water sectors by targeting their human-machine interfaces (HMIs), according to a report released by Trend Micro on Tuesday.

Yahoo Class Action Settlement: A $50 Million-Plus Sting

10/24/2018

A proposed agreement that would settle a class action suit against Yahoo over record-breaking data breaches could see the company pay as much as $85 million.

Connecticut City Pays Ransom After Crypto-Locking Attack

10/23/2018

A tale of two different ransomware victims' responses: One town in Connecticut says it was left with little choice but to pay a ransom after attackers crypto-locked its systems. But a water utility in North Carolina, which was hit by a similar attack, says it will rebuild its systems rather than give attackers any money.

Some Cybersecurity Apps Could Be Worse for Privacy than Nothing at All

10/23/2018

It’s been a busy few weeks for cybersecurity researchers and reporters. There was the Facebook hack, the Google Plus data breach, and allegations that the Chinese government implanted spying chips in hardware components.

Delaware CIO James Collins Elected President of NASCIO Executive Committee

10/21/2018

DOVER, Del. — The Delaware Department of Technology and Information (DTI) is pleased to announce that Chief Information Officer James Collins has been elected to serve as the National Association for State Chief Information Officers (NASCIO) Executive Committee President for the 2018-19 program year. The organization made the announcement Sunday during its annual conference in San Diego. CIO Collins previously served as vice president and succeeds Bo Reese, Chief Information Officer for the State of Oklahoma as president.

(ISC) Report Finds Cybersecurity Workforce Gap Has Increased to More Than 2.9 Million Globally

10/17/2018

Clearwater, FL, October 17, 2018 – (ISC) – the world’s largest nonprofit association of certified cybersecurity professionals – today announced the findings of the 2018 (ISC) Cybersecurity Workforce Study. The research shows a widening of the global cybersecurity workforce gap to nearly three million across North America, Latin America, Asia-Pacific (APAC), and Europe, the Middle East and Africa (EMEA).

CYBERCRIMINALS UTILIZE SOCIAL ENGINEERING TECHNIQUES TO OBTAIN EMPLOYEE CREDENTIALS TO CONDUCT PAYROLL DIVERSION

09/29/2018

The IC3 has received complaints reporting cybercriminals are targeting the online payroll accounts of employees in a variety of industries. Institutions most affected are education, healthcare, and commercial airway transportation.

Ransomware Crypto-Locks Port of San Diego IT Systems

09/28/2018

Several days after the Port of San Diego was hit by a crypto-locking ransomware attack, information security experts are continuing to respond to the incident and many port systems remain offline.

FBI WARNING: BEWARE OF EMAIL SCAM TO STEAL YOUR DIRECT DEPOSIT PAYCHECK

09/27/2018

There’s an email scam underway in which criminals are trying to get your information to steal your paycheck, the FBI has warned. The FBI’s Internet Crime Complaint Center said cybercriminals are using “phishing emails” to try and get Americans to give them pertinent information used to take paychecks.

Equifax Hit With Maximum UK Privacy Fine After Mega-Breach

09/20/2018

Credit bureau Equifax has been hit with the maximum possible fine under U.K. law for "multiple failures" that contributed to its massive 2017 data breach, including its failure to act on a critical vulnerability alert issued by the U.S. Department of Homeland Security.

Cybercrime: 15 Top Threats and Trends

09/19/2018

Criminals operating online continue to target cryptocurrencies, leverage phishing and other social engineering attacks, as well as tweak age-old scams - including Nigerian prince emails - for the modern age. Those are just a handful of takeaways from the Internet Organized Crime Threat Assessment for 2018 from Europol, the EU's law enforcement intelligence agency.

Is My Identity on the Dark Web?

09/17/2018

BRETT JOHNSON IS AN IMPOSING and charismatic ex-con whom the U.S. Secret Service once dubbed the “Original Internet Godfather.” His criminal masterstroke? Creating “Shadowcrew,” one of the first online forums where bad guys could safely buy guns, stolen credit cards, Social Security numbers and every drug imaginable. But Shadowcrew was shut down by federal agents in 2004, and for the next decade Brett was in and out of prison. At one point he went on a four-month run from the law, funded by roughly $500,000 he stole from ATMs. That landed him on the Secret Service’s “Most Wanted” list.

He’s the good guy of our story.

Selling your car? Clear your personal data first

08/27/2018

Your car is a computer that stores a lot of information about you — just like your smartphone or home computer. When you sell or donate your car, that personal data might be accessible to the next owner if you don’t take steps to remove it.

HOW TO PROTECT YOURSELF AGAINST A SIM SWAP ATTACK

08/19/2018

At its most basic level, a SIM swap is when someone convinces your carrier to switch your phone number over to a SIM card they own.

Three Members of Notorious International Cybercrime Group “Fin7” In Custody for Role in Attacking Over 100 U.S. companies

08/01/2018

Three high-ranking members of a sophisticated international cybercrime group operating out of Eastern Europe have been arrested and are currently in custody facing charges filed in U.S. District Court in Seattle, announced Assistant Attorney General Brian A. Benczkowski of the Justice Department’s Criminal Division, U.S. Attorney Annette L. Hayes for the Western District of Washington and Special Agent in Charge Jay S. Tabb Jr. of the FBI Seattle Field Office.

It’s time to stop laughing at Nigerian scammers — because they’re stealing billions of dollars

06/12/2018

On Monday, the FBI announced the arrest of 74 people across the world — including 29 people in Nigeria and 41 in the United States — who authorities say were part of complex international networks that combed filings by the Securities and Exchange Commission, spoofed CEO emails and successfully targeted even hardened employees whose jobs are to safeguard their companies from financial mismanagement.

Facebook Gave Data Access to Chinese Firm Flagged by U.S. Intelligence

06/05/2018

Facebook has data-sharing partnerships with at least four Chinese electronics companies, including a manufacturing giant that has a close relationship with China’s government, the social media company said on Tuesday.

Facebook defends sharing user data with phone makers

06/04/2018

A New York Times investigation published late Sunday revealed the scope of data-sharing deals Facebook (FB) struck over the years with companies like Apple (AAPL), Samsung (SSNLF) and Microsoft (MSFT). The partnerships give some device makers access to Facebook users' education history, relationship status, work, religion, political leaning and upcoming events, the Times reported.

Microsoft's 'DigiGirlz Day' comes to Wilmington University to teach young women about tech careers

05/08/2018

The more than 200 attendees were from all across the state, from Northern Wilmington to Delmar, and all different educational backgrounds, from 31 different public, private, charter, and home schools . They spent a full school day at the University of Wilmington-Dover campus.

Governor Carney Honors “Kids Safe Online” Poster Contest Winners

04/26/2018

For the first time in the ten year history of the contest there was a complete sweep of winners from the same school. Art teacher Kelly Walzl’s fourth grade students Aubrie Rodriguez, Clayton Starkey, and Catalina Syto placed first, second and third, respectively. These students’ posters were judged to be the best among 1,400 submissions.

How Fake Mark Zuckerbergs Scam Facebook Users Out of Their Cash

04/25/2018

A Facebook notification on Gary Bernhardt’s phone woke him up one night last November with incredible news: a message from Mark Zuckerberg himself, saying that he had won $750,000 in the Facebook lottery.

After Detailing Russian Hack, White House Cyber 'Czar' Announces Departure

04/17/2018

"Serving as the White House's cybersecurity coordinator for the last 14-months has been a tremendous opportunity to work on some of our nation's most important cyber challenges," Joyce said in a statement, according to The Washington Post. "I look forward to continuing to serve our nation at the agency I've called home for the last 27 years."

3 Days Of War Games Test Government Response To Serious Cyberattacks

04/12/2018

What would happen if an unfriendly nation tried to take down the power grid, or the air traffic control system, or blow up a chemical plant with a cyberattack? How would government agencies respond to such a threat?

Meet the Padua students who rocked the Girls Go CyberStart competition

04/04/2018

The five-time Cybersecurity State Champs showed up big time during a 24-hour "sleepover hackathon" that earned one Padua team the No. 1 rank in Delaware.

What you need to know about credit card skimming devices

03/15/2018

The Delaware State Police are working to inform the public about the dangers of credit card skimming devices. The devices, which fit simply and inconspicuously over top of credit card readers, have been found throughout the state, primarily at ATMs and gas stations. Police are working with both businesses and banks to get the situation under control.

Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors

03/15/2018

DHS and FBI characterize this activity as a multi-stage intrusion campaign by Russian government cyber actors who targeted small commercial facilities’ networks where they staged malware, conducted spear phishing, and gained remote access into energy sector networks. After obtaining access, the Russian government cyber actors conducted network reconnaissance, moved laterally, and collected information pertaining to Industrial Control Systems (ICS).

Police warn of multiple card skimming devices

03/07/2018

State police say the devices, which can steal your banking information, have been found at businesses up and down the First State. The Delaware State Police are currently investigating several places where skimming devices have been reported. These devices have been primarily placed at ATM’s and gas stations.

Hackers Win Olympic Gold Medal for Disruption

02/12/2018

Hackers have crashed the Winter Olympics, apparently by using destructive malware. On Friday, shortly before the opening ceremonies of the Olympic Winter Games in South Korea, the official Pyeongchang 2018 site stopped working, leaving attendees unable to print tickets. In addition, the WiFi in Pyeonchang Olympic stadium stopped working, as did televisions and internet access in the main press center, the Guardian first reported. It said the website wasn't restored until 12 hours later, on Saturday morning.

Security Pros Need a Mentor: Here's Why and How

02/11/2018

The Multi-State Information Sharing and Analysis Center (MS-ISAC) started a mentoring program in 2012, and this nationwide career-enhancing strategy for security leaders has grown to become stronger than ever. Here are the details on how the mentoring program works and interviews on the benefits with government mentors and mentees. Most important, why you should care and how to get involved.

Internet scammers are terrible. This troll is their nightmare.

02/09/2018

In a call center, somewhere on Earth, a telephone rang. John picked up. On the other end of the line was a man who spoke in a preposterously fake Russian accent and introduced himself as “Vicktor Viktoor,” which was not his real name.

Delaware enlisting more girls in the fight against hackers

02/02/2018

Listen up, girls. Delaware needs your help this month defending the state's internet grid against a gang of cybercriminals and hackers. Our online safety and security rest in your hands. Report to Cyber Protection Agency headquarters and get to work immediately!

Ransomware was most popular cyber crime tool in 2017

01/25/2018

Ransomware attacks on business increased by 90% in 2017, while attacks on consumers leapt by 93%, according to the latest annual state of malware report by security firm Malwarebytes.

Delaware announces cybersecurity partnership for high school girls

01/23/2018

Delaware leaders are offering a free training opportunity for high school girls interested in a career in cybersecurity. The partnership between the state and the SANS Institute offers cybersecurity training for high school girls in Delaware to find out if they have talent or interest in the field through a free online game called, "Girls Go CyberStart".

CyberStart initiative focuses on signing up high school girls

01/13/2018

Delaware is continuing its efforts to find the next generation of cybersecurity professionals. The First State has signed on to participate in the new GirlsGoCyberStart initiative this February.

Intel's CES keynote: CEO vows quick fix to security flaw

01/09/2018

LAS VEGAS — Before unleashing a futuristic spectacle during his CES keynote here Monday night, Intel CEO Brian Krzanich addressed the recent security flaws in processors made by it and other chip makers.

Intel Memory Access Design Flaw Already Addressed by Apple in macOS 10.13.2

01/03/2018

According to developer Alex Ionescu, Apple introduced a fix in macOS 10.13.2, with additional tweaks set to be introduced in macOS 10.13.3, currently in beta testing. AppleInsider also says that it has heard from "multiple sources within Apple" that updates made in macOS 10.13.2 have mitigated "most" security concerns associated with the KPTI vulnerability.

Intel Responds to Security Research Findings

01/03/2018

Intel and other technology companies have been made aware of new security research describing software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from computing devices that are operating as designed. Intel believes these exploits do not have the potential to corrupt, modify or delete data.

Intel Flaw Affects Nearly Every Modern Day Device

01/03/2018

Researchers have finally disclosed complete technical details of two kernel side-channel attacks, Meltdown and Spectre—which affect not only Intel but also systems and devices running AMD, ARM processors—allowing attackers to steal sensitive data from the system memory.

Delaware is getting ready for the future of cybersecurity: Delaware Voice

12/19/2017

Delaware’s economy is based on innovation, and technology takes center stage. To be prepared to meet future demands, our state must focus on building a pipeline of talented security professionals.

F.C.C. Repeals Net Neutrality Rules

12/14/2017

WASHINGTON — The Federal Communications Commission voted on Thursday to dismantle rules regulating the businesses that connect consumers to the internet, granting broadband companies the power to potentially reshape Americans’ online experiences.

Desperate for Cybersecurity Workers, States Help Build the Next Generation

11/27/2017

Internships for veterans, cyber classes for high school and college students and mentoring programs — aimed especially at middle-school girls — are among the ways states are trying to beef up their cybersecurity ranks. Cybersecurity is the most pressing issue for state information technology officials, as hackers and cybercriminals increasingly take aim at government networks, which contain information such as Social Security, bank account and credit card numbers of millions of people and businesses.

Government Outlines When It Will Disclose Or Exploit Software Vulnerabilities

11/17/2017

Government agencies that deal with cybersecurity, like the National Security Agency, have two competing interests. On the one hand, they want to protect America's online infrastructure and economy from cyberattacks. On the other hand, government agencies want to harness tools to attack opponents in cyberspace.

Fake Amazon gift cards, phony Walmart sites and other cyber scams tempt holiday shoppers

11/16/2017

Why wait for Black Friday — or Cyber Monday — to shop? After all, holiday shopping deals are all over the place already. But if you think you're too smart to get caught by a scammer, well, think again. Two in five U.S. consumers have fallen victim to an online phishing attack, according to a 2017 Cyber Monday Phishing Survey by DomainTools.

The top 5 malware threats targeting Macs

11/08/2017

While Macs offer strong security protections, they are far from immune to malware, according to new data from security firm Avast. Since January 2017, Avast has blocked more than 250 million malware threats aimed at their Mac customers.

IoT devices are an enterprise security time bomb

11/08/2017

The Internet of Things (IoT) is causing serious security concerns for enterprises worldwide with few companies capable of securing them as they are unable to identify devices properly, according to new research.

Sneaky fake WhatsApp app attracts more than 1 million downloads

11/06/2017

A sneaky app maker pretended to be the actual WhatsApp service with an app called Update WhatsApp Messenger. But it copped the developer title "WhatsApp Inc."—the same title the actual Facebook-owned chat messenger uses on Google Play.

IoT Security Fail: Hacked Vacuum Cleaner Becomes Spy Cam

10/30/2017

It doesn't take long for security research into IoT vulnerabilities to swerve into creepy territory. As more internet-capable home appliances with built-in cameras, microphones and sensors replace legacy appliances, the potential for exploitable security flaws that might be used for incredibly invasive privacy violations dramatically increases.

Cyber sages help small businesses tighten up

10/30/2017

While you're out there living your life, cybercriminals are at work trying to get something that isn't theirs - all day, every night, on weekends and holidays, 24/7. You can see the constant combat on a map of the world - hundreds of thousands of real-time attacks - on security websites such as FireEye, whose CEO, David DeWalt, earned his degree in computer science at the University of Delaware.

Bad Rabbit ransomware attack bites Europe

10/25/2017

Russia, Ukraine and Turkey are among the nations that have fallen victim to Bad Rabbit, which appears to be related to Petya.

Homeland Security and FBI issue cyber threat warning

10/23/2017

CNBC's Eamon Javers reports government officials are warning of possible hacks on energy and industrial firms.

Governor Carney Launches “NSA Day of Cyber” School Challenge at Secure Delaware 2017

10/12/2017

"Cybercrime is one of the greatest threats to our nation and we live in a world where we increasingly rely on electronic information storage and communication that must be protected,” said Governor Carney. “The importance of cyber security cannot be overstated, and Delaware’s innovation economy needs a talented pipeline of cyber security professionals."

OpenBracket coding competition doubles prize package in second year

10/08/2017

OpenBracket goes into its second year with more than $100,000 in prizes. The figure doubled from the previous year.

The Equifax Data Breach: What to Do

09/08/2017

If you have a credit report, there’s a good chance that you’re one of the 143 million American consumers whose sensitive personal information was exposed in a data breach at Equifax, one of the nation’s three major credit reporting agencies.

Equifax breach exposed data for 143 million consumers

09/07/2017

Credit monitor Equifax said Thursday that hackers have gained access to personal information belonging to 143 million U.S. consumers after exploiting a vulnerability on the company's website. Now the unwitting victims have to worry about the threat of having their identities stolen.

An FDA First: Cyber Recall for Implantable Device

08/29/2017

The Food and Drug Administration on Tuesday issued an alert about the first recall of a network-connected implantable device due to cybersecurity vulnerabilities.

Governor Carney Signs Legislation Extending Cybersecurity Protections for Delawareans

08/17/2017

NEWARK, Del. – Governor John Carney on Thursday signed into law House Substitute 1 for House Bill 180, legislation that requires additional protections for Delawareans whose personal information may be compromised in a computer breach, including additional notifications and free credit monitoring services.

Delaware Tech students win national cybersecurity competition

08/4/2017

A group of Delaware Technical Community College students asserted their place as top cybersecurity talents after winning a national Capture-the-Flag competition on July 21.

Report: What States Are the Best for Data Innovation?

07/31/2017

The Best States for Data Innovation, released on Monday, July 31 by the Washington, D.C.-based Center for Data Innovation, ranked Massachusetts, Washington and Maryland as the No. 1, 2 and 3 states overall. Delaware followed fourth-ranked California in rounding out the top five, while Utah placed sixth; Virginia got spot No. 7; Oregon placed eighth; transportation innovator Colorado ran ninth; and New York was 10th.

Delaware turns to high schoolers to bolster cybersecurity workforce

07/18/2017

In a two-pronged approach to cultivate tech talent and create jobs, Delaware has launched a $650,000 cybersecurity training and scholarship program for high school and college students.

Gas Pump Skimmer Sends Card Data Via Text

07/17/2017

Skimming devices that crooks install inside fuel station gas pumps frequently rely on an embedded Bluetooth component allowing thieves to collect stolen credit card data from the pumps wirelessly with any mobile device. The downside of this approach is that Bluetooth-based skimmers can be detected by anyone else with a mobile device. Now, investigators in the New York say they are starting to see pump skimmers that use cannibalized cell phone components to send stolen card data via text message.

Consumer Notice: Internet-Connected Toys Could Present Privacy and Contact Concerns for Children

07/17/2017

The FBI encourages consumers to consider cyber security prior to introducing smart, interactive, internet-connected toys into their homes or trusted environments. Smart toys and entertainment devices for children are increasingly incorporating technologies that learn and tailor their behaviors based on user interactions. These toys typically contain sensors, microphones, cameras, data storage components, and other multimedia capabilities – including speech recognition and GPS options. These features could put the privacy and safety of children at risk due to the large amount of personal information that may be unwittingly disclosed.

Governor Carney, Chief Information Officer Announce Innovative Cybersecurity Partnership for Students

07/14/2017

Governor John Carney announced on Friday a new, innovative cybersecurity training partnership between the SANS Institute and the State of Delaware that provides Delaware high school juniors and seniors at least 16 years old, and college students interested in a cybersecurity career, the opportunity to learn basic cybersecurity skills and test their aptitude through a no-cost online game of discovery called CyberStart.

Identifying and Reporting Common Scams

07/13/2017

On July 6, 2017, the Federal Trade Commission (FTC) issued an alert on scammers posing as FTC officials who contact individuals and claim they have won prizes from a charity contest. The scammers ask for money to cover taxes or insurance costs associated with the prize. While this is a new malicious campaign, scammers use these basic tactics time and time again with slightly different wording to take advantage of unsuspecting individuals.

Inspiring Women in STEM Conference date, speakers announced

07/10/2017

Two women helping to lead Delaware's future economic growth in the fields of science and technology will headline this year's Inspiring Women in STEM Conference. The annual conference is designed to provide professional development, skill building and networking for women in all fields of science and technology.

Cyberattack Hits Ukraine Then Spreads Internationally

06/27/2017

Computer systems from Ukraine to the United States were struck on Tuesday in an international cyberattack that was similar to a recent assault that crippled tens of thousands of machines worldwide.

Ransomware virus hits computer servers across the globe

06/27/2017

A ransomware attack hit computers across the world on Tuesday, taking out servers at Russia's biggest oil company, disrupting operations at Ukrainian banks, and shutting down computers at multinational shipping and advertising firms.

Delaware man with history of cyber theft under FBI scrutiny

06/25/2017

A Delaware hacker, connected to high-profile, multimillion-dollar cyber thefts during the past decade, is a target of the FBI — evidenced by federal agents' recent seizure of a new BMW coupe and nearly $40,000 in cash from his Wilmington-area home.

A Cyberattack the World Isn’t Ready For

06/22/2017

Mr. Ben-Oni has been sounding alarm bells, calling anyone who will listen at the White House, the Federal Bureau of Investigation, the New Jersey attorney general’s office and the top cybersecurity companies in the country to warn them about an attack that may still be invisibly striking victims undetected around the world.

Girl Scouts Look To Boost Interest in IT Careers With New Cybersecurity Badges

06/20/2017

To inspire a familiarity and interest in cybersecurity among girls, the Girl Scouts of the USA partnered with Palo Alto Networks to create 18 new cybersecurity badges.

How WannaCry Survives

06/16/2017

The ISMG Security Report leads with testimony from the CEO of the company that crippled WannaCry's ransomware component who explains to Congress how the worm continues to attack unpatched systems at increasing rates.

WSC Partners with SANS Institute CyberTalent

06/13/2017

WSC to Partner with SANS Women’s Immersion Academy to Increase Participation of Women in the Information Security Workforce Collaboration to provide high-potential students with tuition-free, scholarship-based cybersecurity training. Review the Press Release.

How to Stop and Remediate WannaCry

05/18/2017

The effects of WannaCry, the ransomware dominating international headlines, continue to be felt by organizations and individuals alike. If you or anyone you know has had a device infected, (ISC)2 has advice for stopping and remediating the attack.

AN ACT TO AMEND TITLE 6 OF THE DELAWARE CODE RELATING TO BREACHES OF SECURITY INVOLVING PERSONAL INFORMATION.

05/16/2017

This Act amends Chapter 12B of Title 6 to update Delaware's law regarding computer security breaches. This Act makes technical corrections to conform to the standards of the Delaware Legislative Drafting Manual, including the use of the term "person" to mean both an individual and an artificial entity.

In Computer Attacks, Clues Point to Frequent Culprit: North Korea

05/15/2017

SAN FRANCISCO — Intelligence officials and private security experts say that new digital clues point to North Korean-linked hackers as likely suspects in the sweeping ransomware attacks that have crippled computer systems around the world.

WannaCry: Everything You Need To Know About the Ransomware Sweeping the Globe

05/14/2017

A massive cyberattack has been spreading across the globe since Friday, May 12, 2017, hitting hundred of thousands of computers and crippling major government and corporate operations. The malware is known as WannaCry, and here's what you need to know.

Alert (TA17-132A) Indicators Associated With WannaCry Ransomware

05/12/2017

The latest version of this ransomware variant, known as WannaCry, WCry, or Wanna Decryptor, was discovered the morning of May 12, 2017, by an independent security researcher and has spread rapidly over several hours, with initial reports beginning around 4:00 AM EDT, May 12, 2017. Open-source reporting indicates a requested ransom of .1781 bitcoins, roughly $300 U.S.

More than 300 girls celebrated DigiGirlz

05/04/2017

“Find your passion and figure out how to turn it into a career. Then work won’t seem like work,” State Cyber Security Officer Elayne Starkey encouraged the nearly 300 teen girls who attended DigiGirlz Day Tuesday.

Netflix Episodes Posted After Hackers Demand Ransom

05/01/2017

Alleged ‘Orange Is the New Black’ Episodes Posted After Hackers Demand Ransom. Fans of the Netflix prison drama "Orange Is the New Black" face a dilemma after hackers claimed to have leaked most of the new season's 13 episodes this weekend — wait more than a month for the official release date or give in and download the pirated shows.

Ransomware became three times more expensive in 2016

04/27/2017

In 2015, the average profit for a cyber thief through ransomware was $294. Symantec found in its Internet Security Threat Report that demands have more than tripled, jumping up 266 percent to an average $1,077 per victim. Depending on how important the files are, it might be cheaper to just buy a new computer.

Is apple.com really apple.com? The answer: Maybe.

04/21/2017

People are being warned about an old phishing technique capable of duping even the most clued-up internet users. The attack exploits the fact that lots of different characters look identical.

Attack Sets off 156 Emergency Alarm Sirens in Dallas

04/13/2017

An attack set off all the emergency sirens in Dallas, Texas, for a spell of around 90 minutes on Friday night. As reported by Reuters, the attack successfully triggered 156 sirens, normally used to warn of dangerous weather conditions such as tornadoes, at 11.42 p.m. CDT. It took engineers until 1:17 a.m. on Saturday to manually shut down the sirens’ radio system and repeaters.

These Hackers Want To Do Your Taxes, And Take Your Refund Too

04/11/2017

The tax deadline this year is April 18, but thieves looking to steal tax returns likely started as early as January, sending about 300 to 1,000 scams a week. If they don't file a fraudulent tax return before the real person does, the thief simply moves on to the next victim.

Calling All Women: The Cybersecurity Field Needs You And There's A Million Jobs Waiting

04/03/2017

Cybersecurity has a gender problem: Only 11% of the world's information security workforce are women, according to the Women's Society of Cyberjutsu (WSC) -- a 501(c)3 non-profit passionate about helping and empowering women to succeed in the Cybersecurity field.

Feds Pull FAFSA Tool After Potential Data Breach

03/30/2017

Families applying for federal student aid are facing extra hurdles this year after a potential data breach led federal officials to remove an online tool that smoothed the process. The Education Department and the Internal Revenue Service said Thursday that an online service known as the Data Retrieval Tool will stay offline for the rest of this application season. In the past, families could use the tool to import their tax information automatically to the Free Application for Federal Student Aid, a complex form needed to get federal aid.

If Your iPhone is Stolen, These Guys May Try to iPhish You

03/14/2017

KrebsOnSecurity recently featured the story of a Brazilian man who was peppered with phishing attacks trying to steal his Apple iCloud username and password after his wife’s phone was stolen in a brazen daylight mugging. Today, we’ll take an insider’s look at an Apple iCloud phishing gang that appears to work quite closely with organized crime rings — within the United States and beyond — to remotely unlock and erase stolen Apple devices.

Tech Roundup

03/08/2017

On Tuesday, WikiLeaks released a huge cache of documents that detail how the C.I.A. has collected various types of cyberweapons, including so-called zero-day vulnerabilities that would expose iPhones, Android phones, Windows and Linux computers, internet-connected televisions and maybe even high-tech cars to hackers.

Breaches Affecting 500 or More Individuals

02/17/2017

U.S. Department of Health and Human Services, as required by section 13402(e)(4) of the HITECH Act, the Secretary must post a list of breaches of unsecured protected health information affecting 500 or more individuals. These breaches are now posted in a new, more accessible format that allows users to search and sort the posted breaches. Additionally, this new format includes brief summaries of the breach cases that OCR has investigated and closed, as well as the names of private practice providers who have reported breaches of unsecured protected health information to the Secretary.

Here Is How to Fend Off a Hijacking of Home Devices

02/01/2017

MODERN homes today are getting internet-connected light bulbs, thermostats, TVs and speakers. So with a simple voice command or the touch of a button on our smartphones, we can set the temperature, turn on a light or prepare the TV to record a program. What could go wrong?

IRS to Delay Tax Refunds as a Security Precaution

01/23/2017

Refunds for more than 40 million low-income families could be delayed by the IRS this year, as the tax agency looks to leverage the extra time to combat identity theft and fraud.

19,000 Delaware Blue Cross Blue Shield members' data breached

01/13/2017

Two subcontractors of Highmark Blue Cross Blue Shield of Delaware were breached in an incident that has compromised 16 of the insurer's self-insured customers and about 19,000 of their members.