-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 6 months ago
It was stated at the RSA Conference 2018 that “If cybercrime was a country, it would have the 13th highest GPA in the world.” Attackers generate $1.5 trillion in annual profit, which is about equal to the GDP of […]
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 6 months ago
Cybercriminals have obtained more than five million credit & debit card numbers from customers of Saks Fifth Avenue and Lord & Taylor. The data was stolen using software that was implanted into the cash register […]
-
Russian hacks have particularly grown in the last 2 years and this is quite alarming for sure. Good news is that the main financial platform i.e. the e-commerce seems to be unaffected and this could probably be an indication that customer data would not have been stolen. There is a serious need to have more strict regulations with respect to such attacks and to equip retail companies, which are particulate high-transaction systems, with anti-cyber attack systems.
-
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 6 months ago
A cyber-attack on a shared data network forced four of the nation’s natural gas pipeline operators to temporarily shutdown computer communications with the customers for over a week. No gas service was i […]
-
Elizabeth,
I really enjoyed reading this article and was quite surprised with the way the attacks were conducted on Natural gas pipeline. I believe public resources, especially government aided, are far more protected than private organizations data. While it’s still unsure whether the customer data was stolen or not, I would certainly not like to see anything here. I believe that there has absolutely been no harm in having dependency, but what was more important is the concrete firewall that should have been in place to prevent cyber-attacks on pipeline infrastructures. -
Quite an interesting article though. This is definitely one of the breakthroughs as I would like to say as this would allow lesser management of passwords and users can easily login using either of single or multi-factor authentication protocols. The only solution for this is to partner with hardware manufacturing companies to integrate this in the systems before being shipped to consumers.
-
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 6 months ago
Boeing recently stated that it was hit by a cyber attack that was identified as the same WannaCry computer virus that hit thousands of computer systems in more than 70 countries last year. There is concern that […]
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 6 months ago
Uber has agreed to an updated settlement with the Federal Trade Commission (FTC). The organization was charged last year for deceiving customers with its privacy and data security practices. The new settlement […]
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 6 months ago
Suzette Kugler, a former database administrator at PenAir, will serve a fiver-year probation sentence for hacking the airline’s database. The database was for its ticketing and reservation system. After her r […]
-
Elizabeth V Calise commented on the post, NIST 800 60 V1R1 Guide for Mapping Types of Information and Information Systems to Security Categories, on the site 6 years, 7 months ago
Interesting article. I do agree that this is a bit scary to read. It would have been nice though if Kevin Mandia, FireEye CEO, provided more detail to support his statement. We can all make assumptions on his reasoning behind his comment, but it would have been more beneficial to understand why he believed the U.S. would lose against Russia in a cyber-war.
-
Elizabeth V Calise commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 6 years, 7 months ago
Good article, definitely something to be aware of. Every time I read the words Google Chrome, I automatically think “leeches.” They collect more data than any other browser and it is like they need your data to survive just like a leech needs blood. I try to avoid using Google Chrome as much as possible. When I initially read the title of the art…[Read more]
-
Elizabeth V Calise commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 6 years, 7 months ago
Fred, really interesting article you posted. I remember last year when Internet privacy laws were scrapped and all my IT friends kept discussing VPN. What is more concerning is that the VPN services which contained vulnerabilities were the services provided by three popular VPN providers. I could expect this from a smaller provider, but not a…[Read more]
-
Elizabeth V Calise commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 6 years, 7 months ago
I always find cyber-attacks on the healthcare industry quite interesting because of the type of business it is and the data they have stored. Since the attack was not due to an employee opening a scam email, I am very curious how the ransomware spread throughout the hospital. Also, I did find it a bit comical that they were hanging up posters to…[Read more]
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 7 months ago
Hidden Cobra, a threat group linked to North Korea, has turned its interest to the financial institutions in Turkey. McAfee reported finding malware (known as Bankshot) associated with the group surfacing on […]
-
That’s pretty bad considering that these attacks happened on the top 3 financial institutions. It’s still unsure why the attacks happened, but if they have already compromised sensitive financial data, then it might actually cause huge financial loss or even breakdown of the Turkish economy. It’s important to revisit the security systems or try to grab hands of 3rd party security companies to see the source.
-
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 7 months ago
Recently, hackers used software to penetrate the German government’s main data network. This system is used by the chancellor’s office, ministries and the Parliament. News sources are claiming a Russian hac […]
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 8 months ago
Nathan Ruser, an Australian university student, tweeted that a fitness application revealed the locations of military sites in Syria and other places. He was not expecting much response to his tweet. However, this […]
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 8 months ago
The Pyeongchang Winter Olympics (In South Korea) was disrupted by a malware attack before and during the opening ceremony. The cyber-attack involved 12 hours of downtime on the official website, the collapse of […]
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 8 months ago
There are constant reports about new attacks, breaches, exploits and threats which make it difficult for stakeholders to understand the full impact of cybercrime. A report from McAfee in collaboration with the […]
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 8 months ago
Over 2,000 WordPress websites have been found infected with a piece of Crypto-mining malware. The malware does not only steal the resources of visitors’ computers to mind digital currencies, but also logs v […]
-
Elizabeth V Calise commented on the post, How UK cops are becoming ethical hackers, on the site 6 years, 11 months ago
Interesting article. I have not read anything related to this before. The UK took an interesting approach to tackle the increase in cyber security for the country. It is definitely known that everywhere is short when it comes to cyber security professionals. It is a profession in high-demand. After taking the Forensics class in ITACS, this could…[Read more]
-
Elizabeth V Calise commented on the post, Obsolete, outdated software puts Victorian hospitals and police at risk of cyber attacks, on the site 6 years, 11 months ago
The article contains serious information on the situation. It states that the five government outfits were audited, which included the Department of Health and Human Services and Victoria Police, yet none of the were able to satisfy the auditors. Almost half of the systems were obsolete and 80% were close to or beyond their end of life. I can’t i…[Read more]
-
Elizabeth V Calise wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
Recently, Amazon has announced that it will be offering a new service where Prime members can receive in-home delivery of packages. This can be done with the help of high-tech smart locks that allow Amazon drivers […]
-
Elizabeth,
Great find! Here is a quick story…
I used to own a corner property between the local middle school and elementary school. It wouldn’t be uncommon to see groups of kids walking across my property before and after school. On a few occasions, I would have packages missing from my door. I remember a cell phone and cable box being the most frustrating, but also had a text book that went missing. This all happened within a short period of time, which forced me to notify the post office, ups, and fedex to hold the package at the local branch. I have moved since then and have never had an issue with my new house.
I see my situation isn’t uncommon based on the story your provided. This is why I think Amazon is offering this type of service with such high risk and liabilities. They must be seeing an increase in packages being lost / stolen during transit.
I can see how you have mixed feelings about this. I have the same uncertainty as you. I also think you are taking a big chance with letting a “stranger” in your house. Imagine:
1. If the delivery person was having a bad day and decided to do something “stupid”. Yeah, they may reimburse you for the “stupidity” if possible but what if it is something very serious? Example. Assault, robbery / burglary, or creepy things like, going through your personal things.
2. If someone followed the delivery person to your house, waited until the delivery person opened the door, sneaked in and hid somewhere while the delivery person was walking back and forth to unload the boxes, and waited until the delivery person left or better yet, said they were the owners relative / friend and stopping by to feed the dog, take out the trash, or what ever.
Yikes!
-
Hi Elizabeth,
Now that’s an interesting innovation from Amazon for sure. Amazon has previously innovated many products, but in terms of security of goods and services, this secure lock is definitely worth the money. This will ensure that the goods delivered are safe and are not stolen or opened. -
This sounds great and if implemented properly by both Amazon and the customer, there are ways to mitigate the risks. Anyone with a security system such as Ring can see when Amazon made the delivery. The cloud cam is a good idea as it can track the delivery driver. I think as time progresses, they can modify it and it may become stronger in terms of deliveries.
-
You know it is really funny that this is a thing now. When Amazon came out with this I mentioned that this would be a huge vulnerability to a couple friends and lo and behold here we are. I do not understand how people thing that this is a good idea.
-
-
Elizabeth V Calise wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
Breaches in the retail and hospitality industries have decreased to less than 5 times per month. Previously, it was in the double digits over the past two years. The decrease is due to the merchants, hotels and […]
-
Elizabeth,
This is fantastic news. I think this is what is required from critical care services such as hospitals and especially mass businesses such as retail. Strengthening the PoS systems with chip cards and EMV are great examples as they do not store any data. It would be interesting to see how advancements in these areas take shape.
-
- Load More