Posts tagged "Cyber Security"

Ebola & Cybergeddon: Why the Novelty Could Kill You

cybergeddon

What does cybergeddon have to do with ebola?

In 2014 Ebola has claimed over 4,000 lives in Western Africa and caused ONE death (of a person who contracted the disease in Africa) in the United States. Many Americans are in a proper panic about it and it continues to be front page news.  In typical fashion, we have found something to worry about while conveniently ignoring other, “less sensational” but more critical topics:

  • According to the CDC, Influenza kills about 3,000 people in this country in a good year (1986-1987) and up to nearly 50,000 in a bad one (2003-2004).  Yet during the 2013-2014 flu season, only 46 percent of Americans received vaccinations against influenza.
  • Seat belts have saved an estimated 255,000 lives since 1975.  Yet each year more than 50 percent of people killed in car crashes were not wearing a seat belt.

Posted in Cyber Data Security by Identity Theft Speaker .
Tags: , , , ,

GameOver Zeus Virus Test

gameover zeus

The original notice on GameOver Zeus appeared on the US-CERT site. If you’d like to go directly to the tests for the GameOver Zeus virus, scroll down.

Overview of GameOver Zeus

GameOver Zeus (GOZ), a peer-to-peer (P2P) variant of the Zeus family of bank credential-stealing malware identified in September 2011, [1] uses a decentralized network infrastructure of compromised personal computers and web servers to execute command-and-control. The United States Department of Homeland Security (DHS), in collaboration with the Federal Bureau of Investigation (FBI) and the Department of Justice (DOJ), is releasing this Technical Alert to provide further information about the GameOver Zeus botnet.

Systems Affected by GameOver Zeus Virus

  • Microsoft Windows 95, 98, Me, 2000, XP, Vista, 7, and 8
  • Microsoft Server 2003, Server 2008, Server 2008 R2, and Server 2012

Impact of GameOver Zeus

A system infected with GOZ may be employed to send spam, participate in DDoS attacks, and harvest users’ credentials for online services, including banking services.

Posted in Cyber Data Security, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , ,

5 Ways to Doom Your Next Cyber Security Summit (Cyber Security Speakers Like Ambien)

Boring cyber security speakers?

Have you ever snored through a cyber security speaker’s presentation, despite being caffeinated, sugared up and subjected to convention-strength air-conditioning? So imagine what it’s like for audience members who desperately need high-level background on data protection (so that their organization doesn’t become the next Target), but don’t have a technical bone in their body.

Many cyber-security awareness events are studded with brilliant techies full of amazingly useful ideas who have a minor problem communicating their genius. And if your audience members don’t listen, don’t understand, don’t care–then there is little hope of changing their risky data-security habits. Attendee boredom is a meeting planner’s nightmare, an IT department’s budget-buster and an organization’s fast track to data breach.

But your event doesn’t have to be this way. Avoid the 5 Ways and your team will become the silent hero of your next conference.

Posted in Cyber Data Security by Identity Theft Speaker .
Tags: , , , ,

Cyber Security Webinar: What You Absolutely, Positively Need to Know (10/3/13)

Security Keynote Speaker John Sileo
register.jpg

Register Now for Deluxe/Sileo’s Free Cyber Security Webinar

On October 3, 2013 at 1pm ET, Deluxe and data privacy expert John Sileo will present a FREE Cyber Security Webinar – What You Absolutely, Positively Need to Know.

A 2012 survey by the highly respected Ponemon Institute found that 55% of small businesses had experienced at least one data breach in 2012. At the heart of this massive data loss is lax cyber security: an overly broad term that will no longer intimidate you after this webinar. Technology has evolved so quickly that many businesses and individuals find themselves behind the digital curve and overwhelmed by the prospect of protecting the very data that underlies their wealth. While in this state, decision makers tend to shut down, make excuses and assume that there is no reasonable, inexpensive way to protect themselves and their business. That assumption is not only wrong, it is dangerous.

Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , ,

Sileo Speaking at NAFCU Technology and Security Conference

Credit Union Members: A special thanks to NAFCU for having me back a second year to present at their Technology and Security Conference.  Join us in Vegas for some fun and really get into the nuts and bolts of cyber security.

Screen shot 2013-09-09 at 11.04.06 AM

 
 

Posted in Cyber Data Security by Identity Theft Speaker .
Tags: , , , , , , , ,

Congress Fails to Limit NSA Surveillance Using Patriot Act Loophole

NSA Surveillance includes the collection of your phone and email records for the sake of detecting and disrupting terrorism. The practice has proven effective, but the scope of the data collected (every phone call and email available, even if you are innocent) has raised eyebrows.

Congress, in a rare show of bipartisan agreement, may be leaning toward limiting the amount of data the NSA can collect.

Rep. Justin Amash, R-Mich., backed by Rep. John Conyers, D-Mich., put forth an amendment that would restrict the NSA’s ability to collect data under the Patriot Act on people not connected to an ongoing investigation.  The action was initiated after Edward Snowden, a government contract worker, leaked highly classified data to the media, revealing that the NSA has secretly collected phone and email records on millions of Americans without their knowledge or consent.

Posted in Cyber Data Security, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , ,

Why the boss should also be the privacy expert

Privacy Expert Boss

If you’re the head of a company, it’s your duty to be no less than a privacy expert. Cyber criminals are betting on the fact that you aren’t one, and your whole company could suffer if you don’t take action to become one.

We’ve discussed before the necessity of keeping employees well-trained against cyber attacker’s tricks, such as spear-phishing. Well, it turns out that the big bosses are actually even more likely to fall for social engineering attacks according to a recent article in the Wall Street Journal.

The article quoted a study by Verizon that indicates these executives are often exempt from company-wide security rules and are more likely to open email or click on links that expose their company’s secure information.  Especially at a time when so many are hit with phony emails, no one can afford to be lax on cyber security. CEOs and other high-level bosses are usually highly visible, public-facing, have access to proprietary information, and are often disengaged from the online security process: in other words, they are the perfect target. 

Posted in Online Privacy by Identity Theft Speaker .
Tags: , ,

2 Truths & a Lie: Venture Capital Frenzy Misses Cyber Security Mark

Cyber Security Venture CapitalUSA Today recently opined that the venture capital flooding into the cyber security marketplace is justified. Unlike the dotcom boom and bust cycle of the late 90s, it says, the current spending on securing information capital is justified, as the Internet and corporate networks are in dire need of better protection. Without even a moment’s hiccough, this is undeniably true.

Take some recent cases in point: China hacking into the New York Times and Wall Street Journal, or the Syrian Electronic Army cracking into the Associated Press and 60 Minutes. If you’re looking for corporate examples, look no further than the $45 million stolen by cyber thieves via MasterCard pre-paid debit cards. Cyber security is the new darling of the Obama administration, the media and Sandhill Road because all three are finally learning how much they have to lose (or in the case of VCs, gain) by ignoring cyber security.

Posted in Cyber Data Security, Online Privacy by Identity Theft Speaker .
Tags: , , ,

Will cyber security training shield us from Chinese espionage?

Cyber Security Training Chinese Espionage

The Pentagon has now openly accused China of launching online attacks on the U.S. Will your cyber security training withstand the mounting threat? 

There is no more dancing around it now. Although there have been mentions and whispers of Chinese-based cyber attacks in the past, China has now been publicly named as responsible for performing cyber espionage on American cyber soil. This move away from the indirect, diplomatic approach of addressing cyber espionage and into a more direct dialogue signals a new direction in the cyber threat debate. 

The language coming from the government on this is chilling, and although we’ve known something about state-sponsored cyber espionage for some time, to see it written in the DOD’s Annual Report to Congress will make you think twice about the imminent threat and the depth of your cyber security training.

Posted in Cyber Data Security by Identity Theft Speaker .
Tags: ,