You're used to these by now, right? Perhaps even bored with them (which is dangerous). This week, we saw news of yet another big data breach, this time to the image sharing company, Imgur. The good news is Imgur doesn't gather personally identifying information (PII) like addresses, birthdays, or credit cards. The bad news is the hackers made off with 1.7 million user … [Read more...]
Deloitte Email Breach – Daily Security Byte
Add Deloitte to the long list of hacked organizations. This week, Deloitte warned that they had suffered a security breach on their email server. So far, they claim it only affected limited customers, and didn't disrupt their business. Watch the quick video below to learn how the breach happened, and what you can do to protect yourself from this type of incident. Episode … [Read more...]
Equifax Mega-Breach – Daily Security Byte
Whenever some organization has a big data breach--especially one that leaks social security numbers--security experts recommend you sign up for credit monitoring services to watch for ID thieves opening accounts in your name. However, what happens when the credit monitoring organization is the one that leaked your data!? Unfortunately, that's exactly what happened with the … [Read more...]
Op. #LeakTheAnalyst – Daily Security Byte
An anonymous hacker claims to have hijacked a Mandiant researcher's computer and gained access to Mandiant and FireEye's network. So far there is no proof of these claims other than a PasteBin post with a data dump. While the dump does contain some of the hijacked researcher's personal data from cloud accounts, it doesn't really contain any hard proof about the attacker's wider … [Read more...]
CIA Vault 7 Leak – Daily Security Byte
The biggest story last week, by far, was the CIA Vault 7 leak. Wikileaks, a well-known information leak site, released over 8000 documents detailing the CIA's hacking tools and operations. The documents contain information about how the CIA hacks phones, PCs, and even TVs, among other things. Allegedly, the documents even contained exploit and source code for these hackings … [Read more...]