CONTENT MARKETING SPECIALIST

For us, the week ends with a reason for celebration.

As you can see, our blog has a brand new shiny design! We just relaunched it with a new look, one that’s clearer and easier to read.

Also, please let us know what you think (you can use the comments section below). Is there anything else that would make reading the blog easier and more useful?

As for the cyber security news of the week, the talk revolved mostly around the old Yahoo data breach, with new details about it emerging every day. The presidential debate also took the spotlight, as the candidates briefly covered digital security and privacy, a key issue for governments and companies all over the world.

Here are the most important cyber security news from the past week:



Security articles of the week


1. Defending against hackers took a back seat at Yahoo

New details about the Yahoo huge mega data breach surfaced in the past week. Like the fact that Marissa Mayer declined to reset Yahoo users’ passwords 2 years ago.

To sum it up, they feared that people would stop using the company’s products if they added extra security.


2. How hacked cameras helped launch some of the biggest attacks the internet has ever seen

Last week, Brian Krebs’ website was hit with one of the biggest DDoS attacks known – somehwere between 600 and 700 gigabits of traffic per second.

It looks like such attacks use botnets made up of tens of thousands of IoT (Internet of Things) devices, from IP cameras to digital video records and routers.


3. Cyber crooks trying to get into voter databases

James B. Comey, the FBI director, declared that hackers have attempted more intrusions into vote registration databases.


4. 16,000 WordPress sites were hacked

Almost 16,000 WordPress websites have been compromised so far this year, most of them serving up malware.


5.
First presidential debate briefly covered cyber security

This week was the first USA presidential debate, during which Hillary Clinton and Donald Trump briefly talked about cyber security.


6. Here come cyber regulations for companies

“After a steady series of hacking debacles, regulators are stepping in and ordering companies to tighten up. Soon companies in the financial sector — banks, brokerages, and insurance firms — will have to comply with cybersecurity rules that include encrypting sensitive information and appointing a security chief.”


7. 10 most dangerous celebrities of 2016

Intel published the 10th annual McAfee list of the most dangerous celebrities, based on the likelihood of getting hit with malware when searching for their names.


8. Apple tracks who you’re chatting with on iMessage

And turns over this information to law enforcement agencies with a valid court order.


9. Brad Pitt is subject of a new social media scam

Of course scammers are taking advantage of the Brangelina split. This one’s the most recent (and effective) Facebook hoax.


10. The list of data breaches and cyber attacks in September 2016

It’s a HUGE list, probably the biggest so far, and it doesn’t even count the Yahoo data breach (that one dates back to 2014, even if its details just surfaced).


Conclusion


The huge data breach that compromised 500 million Yahoo accounts is not a happy event, but it’s a moment that will hopefully initiate critical change in cyber security.

I’m hoping that it will ignite serious conversations and regulations among companies and users, on cyber security matters. They must be forced to rethink their priorities and embrace a more proactive cyber security approach, as the responsibilities and risks are way too big to be toying with such things.

A kick in the back is a step forward, as they say.

app permissions
2016.05.11 SLOW READ

How to Master Your App Permissions So You Don’t Get Hacked – The Full Guide

About the Time I Got Hacked
2016.02.10 INTERMEDIATE READ

True Story: About the Time I Got Hacked and Lost All My Work

My Account Was Hacked
2016.01.07 INTERMEDIATE READ

My Account Was Hacked – Here’s How to Control the Damages

Leave a Reply

Your email address will not be published. Required fields are marked *

GO TO TOP