Independent

IndependentKrebs

Apple Phone Phishing Scams Getting Better

Credit to Author: BrianKrebs| Date: Thu, 03 Jan 2019 19:21:40 +0000

A new phone-based phishing scam that spoofs Apple Inc. is likely to fool quite a few people. It starts with an automated call that display’s Apple’s logo, address and real phone number, warning about a data breach at the company. The scary part is that if the recipient is an iPhone user who then requests a call back from Apple’s legitimate customer support Web page, the fake call gets indexed in the iPhone’s “recent calls” list as a previous call from the legitimate Apple Support line.

Read More
ComputerWorldIndependent

New year, same old users

Credit to Author: Sharky| Date: Thu, 03 Jan 2019 03:00:00 -0800

IT support pilot fish takes a call to help a user change a password on a webpage form — and it reminds fish of just how much help-desk techs love password resets.

“I spent 25 minutes talking to him,” fish groans. “There were only two buttons to press, Submit and Reset.

“You’d think that after pressing Reset three times and having it erase the passwords he typed in, he would try Submit — right?

“But no — our customer tried a fourth and then a fifth time, until he got the idea to hit the other button.

“This person was by all accounts a functional, employed adult…”

Sharky needs a new year’s worth of stories of users, management and IT gone off the rails. So send me your true tales of IT life at sharky@computerworld.com. You can also comment on today’s tale at Sharky’s Google+ community, and read thousands of great old tales in the Sharkives.

To read this article in full, please click here

Read More
IndependentKrebs

Cloud Hosting Provider DataResolution.net Battling Christmas Eve Ransomware Attack

Credit to Author: BrianKrebs| Date: Wed, 02 Jan 2019 18:32:37 +0000

Cloud hosting provider Dataresolution.net is struggling to bring its systems back online after suffering a ransomware infestation on Christmas Eve, KrebsOnSecurity has learned. The company says its systems were hit by the Ryuk ransomware, the same malware strain that crippled printing and delivery operations for multiple major U.S. newspapers over the weekend.

Read More
ComputerWorldIndependent

If the CTO says it's OK, what could go wrong?

Credit to Author: Sharky| Date: Wed, 02 Jan 2019 03:00:00 -0800

Medical rehab facility is facing a compliance deadline for HIPAA privacy regulations, and that could be a problem, says a cybersecurity pilot fish working there.

“The HIPAA regulations are strewn with potential issues,” fish says. “When some aspect isn’t followed and a patient’s data privacy is compromised, the fines can be substantial.”

And that’s the headache fish faces because of his facility’s use of Gmail. As the site’s cybersecurity engineer, fish knows that ordinary Gmail isn’t HIPAA compliant.

Fortunately, there’s a fix — one that involves additional paperwork and agreements, along with some added security verification. But that’s still easier and less complex than moving everyone off Gmail.

To read this article in full, please click here

Read More
ComputerWorldIndependent

Q&A: Experian exec says biometrics won’t save you from mobile hacks

Credit to Author: Lucas Mearian| Date: Mon, 31 Dec 2018 03:01:00 -0800

If you think your new iPhone’s Face ID facial recognition feature or your bank’s fancy new fingerprint scanner will guarantee privacy and block hackers from accessing sensitive personal or financial data, think again.

In the coming year, cyberattacks will zero in on biometric hacking and expose vulnerabilities in touch ID sensors, facial recognition technology and passcodes, according to a new report from credit reporting agency Experian Plc. While biometric data is considered the most secure method of authentication, it can be stolen or altered, and sensors can be manipulated, spoofed or suffer deterioration with too much use.

Even so, as much as 63% of enterprises have implemented or plan to roll out  biometric authentication systems to augment or replace less-secure passwords, Experian said in its report. The push toward biometric systems dates back to the turn of the century in the financial services industry.

To read this article in full, please click here

Read More
IndependentKrebs

Happy 9th Birthday, KrebsOnSecurity!

Credit to Author: BrianKrebs| Date: Sat, 29 Dec 2018 15:51:25 +0000

Hard to believe we’ve gone another revolution around the Sun: Today marks the 9th anniversary of KrebsOnSecurity.com! This past year featured some 150 blog posts, but as usual the biggest contribution to this site came from the amazing community of readers here who have generously contributed their knowledge, wit and wisdom in more than 10,000 […]

Read More
ComputerWorldIndependent

Tech luminaries we lost in 2018

Credit to Author: Ken Gagne| Date: Thu, 27 Dec 2018 03:00:00 -0800

Remembering our industry’s innovators
CW > In Memoriam 2018 > Tech luminaries we lost this year [slideshow cover]

Image by FreedomMaster / Getty Images

They were the founders of such household names as Atari and Microsoft. They built the hardware and software that powers the Internet. They used computers to give voice to the young and the disabled. And they rarely did so in the spotlight. Whether they ever achieved fame or fortune, these 13 women and men deserve a place in the history books for their lives, accomplishments, and contributions to science and information technology around the world.

To read this article in full, please click here

Read More