Weekly Security Roundup #90: New Details About Old Data Breaches
Autumn’s new cyber attacks and details about old data breaches
Autumn season is officially here and, together with it, an avalanche of new cyber attacks occurred.
But before we dive into the most important cyber security news of the week, take a look over our latest articles:
- We wrote about the human psychological biases that cyber criminals exploit.
- We published a breakdown of the most common cyber security myths (it’s actually an updated version of a two-year old article).
- And last but not least, a security guide about data leakage – how cyber crooks can extract it from you, why and how they do it.
Now off to the most recent security hightlights:
Security articles of the week
1. New details about some data breaches from 2012 surfaced
Multiple services were affected by data breaches back in 2012. Now we have more details about their impact:
- 60 million accounts were compromised in the Dropbox data breach.
- 40+ million accounts compromised in the Last.fm data breach.
- And 100 milliom compromised in the Rambler.ru, Russia’s biggest email provider, data breach.
Because of the recent data breaches suffered by other services, Spotify decided to force a password reset for vulnerable users.
Here’s what you can do if you don’t want WhatsApp to share your data with Facebook.
FBI issued an alert to election officials, warning that cyber criminals compromised the state election systems.
One cybersecurity firm estimates that extortive attacks now cost small and medium companies at least $75 billion in expenses and lost productivity each year.
A history of ransomware attacks, their evolution and how they can be stopped.
One in five businesses infected with ransomware paid the ransom, but never got their data back.
In recognition of the new realities of security threats to NATO, we, the Allied Heads of State and Government, pledge to ensure the Alliance keeps pace with the fast evolving cyber threat landscape and that our nations will be capable of defending themselves in cyberspace as in the air, on land and at sea.
If you are passionate about coding, you’ll probably enjoy this article:
This is a story of one of those core vulnerabilities, and how it took a decade to uncover and resolve.
An interesting article about the unauthorised control of brain implants and how medical devices can be breached.
Focus on the cyber security measures that are in your control and don’t fret about those out of your reach.
Few of the steps that are easy and under your control:
- always set unique and strong passwords;
- change those passwords regularly;
- activate two-factor authentication wherever possible;
- use a password management software that will encrypt them (and help you remember them);
- keep your guard up for phishing attacks;
- stay up to date with cyber security news and latest techniques used by cyber criminals.