-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 7 months ago
It was stated at the RSA Conference 2018 that “If cybercrime was a country, it would have the 13th highest GPA in the world.” Attackers generate $1.5 trillion in annual profit, which is about equal to the GDP of […]
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 7 months ago
Cybercriminals have obtained more than five million credit & debit card numbers from customers of Saks Fifth Avenue and Lord & Taylor. The data was stolen using software that was implanted into the cash register […]
-
Russian hacks have particularly grown in the last 2 years and this is quite alarming for sure. Good news is that the main financial platform i.e. the e-commerce seems to be unaffected and this could probably be an indication that customer data would not have been stolen. There is a serious need to have more strict regulations with respect to such attacks and to equip retail companies, which are particulate high-transaction systems, with anti-cyber attack systems.
-
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 7 months ago
A cyber-attack on a shared data network forced four of the nation’s natural gas pipeline operators to temporarily shutdown computer communications with the customers for over a week. No gas service was i […]
-
Elizabeth,
I really enjoyed reading this article and was quite surprised with the way the attacks were conducted on Natural gas pipeline. I believe public resources, especially government aided, are far more protected than private organizations data. While it’s still unsure whether the customer data was stolen or not, I would certainly not like to see anything here. I believe that there has absolutely been no harm in having dependency, but what was more important is the concrete firewall that should have been in place to prevent cyber-attacks on pipeline infrastructures. -
Quite an interesting article though. This is definitely one of the breakthroughs as I would like to say as this would allow lesser management of passwords and users can easily login using either of single or multi-factor authentication protocols. The only solution for this is to partner with hardware manufacturing companies to integrate this in the systems before being shipped to consumers.
-
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 7 months ago
Boeing recently stated that it was hit by a cyber attack that was identified as the same WannaCry computer virus that hit thousands of computer systems in more than 70 countries last year. There is concern that […]
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 7 months ago
Uber has agreed to an updated settlement with the Federal Trade Commission (FTC). The organization was charged last year for deceiving customers with its privacy and data security practices. The new settlement […]
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 7 months ago
Suzette Kugler, a former database administrator at PenAir, will serve a fiver-year probation sentence for hacking the airline’s database. The database was for its ticketing and reservation system. After her r […]
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 8 months ago
Hidden Cobra, a threat group linked to North Korea, has turned its interest to the financial institutions in Turkey. McAfee reported finding malware (known as Bankshot) associated with the group surfacing on […]
-
That’s pretty bad considering that these attacks happened on the top 3 financial institutions. It’s still unsure why the attacks happened, but if they have already compromised sensitive financial data, then it might actually cause huge financial loss or even breakdown of the Turkish economy. It’s important to revisit the security systems or try to grab hands of 3rd party security companies to see the source.
-
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 8 months ago
Recently, hackers used software to penetrate the German government’s main data network. This system is used by the chancellor’s office, ministries and the Parliament. News sources are claiming a Russian hac […]
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 8 months ago
Nathan Ruser, an Australian university student, tweeted that a fitness application revealed the locations of military sites in Syria and other places. He was not expecting much response to his tweet. However, this […]
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 8 months ago
The Pyeongchang Winter Olympics (In South Korea) was disrupted by a malware attack before and during the opening ceremony. The cyber-attack involved 12 hours of downtime on the official website, the collapse of […]
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 8 months ago
There are constant reports about new attacks, breaches, exploits and threats which make it difficult for stakeholders to understand the full impact of cybercrime. A report from McAfee in collaboration with the […]
-
Elizabeth V Calise wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 9 months ago
Over 2,000 WordPress websites have been found infected with a piece of Crypto-mining malware. The malware does not only steal the resources of visitors’ computers to mind digital currencies, but also logs v […]
-
Elizabeth V Calise wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
Recently, Amazon has announced that it will be offering a new service where Prime members can receive in-home delivery of packages. This can be done with the help of high-tech smart locks that allow Amazon drivers […]
-
Elizabeth,
Great find! Here is a quick story…
I used to own a corner property between the local middle school and elementary school. It wouldn’t be uncommon to see groups of kids walking across my property before and after school. On a few occasions, I would have packages missing from my door. I remember a cell phone and cable box being the most frustrating, but also had a text book that went missing. This all happened within a short period of time, which forced me to notify the post office, ups, and fedex to hold the package at the local branch. I have moved since then and have never had an issue with my new house.
I see my situation isn’t uncommon based on the story your provided. This is why I think Amazon is offering this type of service with such high risk and liabilities. They must be seeing an increase in packages being lost / stolen during transit.
I can see how you have mixed feelings about this. I have the same uncertainty as you. I also think you are taking a big chance with letting a “stranger” in your house. Imagine:
1. If the delivery person was having a bad day and decided to do something “stupid”. Yeah, they may reimburse you for the “stupidity” if possible but what if it is something very serious? Example. Assault, robbery / burglary, or creepy things like, going through your personal things.
2. If someone followed the delivery person to your house, waited until the delivery person opened the door, sneaked in and hid somewhere while the delivery person was walking back and forth to unload the boxes, and waited until the delivery person left or better yet, said they were the owners relative / friend and stopping by to feed the dog, take out the trash, or what ever.
Yikes!
-
Hi Elizabeth,
Now that’s an interesting innovation from Amazon for sure. Amazon has previously innovated many products, but in terms of security of goods and services, this secure lock is definitely worth the money. This will ensure that the goods delivered are safe and are not stolen or opened. -
This sounds great and if implemented properly by both Amazon and the customer, there are ways to mitigate the risks. Anyone with a security system such as Ring can see when Amazon made the delivery. The cloud cam is a good idea as it can track the delivery driver. I think as time progresses, they can modify it and it may become stronger in terms of deliveries.
-
You know it is really funny that this is a thing now. When Amazon came out with this I mentioned that this would be a huge vulnerability to a couple friends and lo and behold here we are. I do not understand how people thing that this is a good idea.
-
-
Elizabeth V Calise wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
Breaches in the retail and hospitality industries have decreased to less than 5 times per month. Previously, it was in the double digits over the past two years. The decrease is due to the merchants, hotels and […]
-
Elizabeth,
This is fantastic news. I think this is what is required from critical care services such as hospitals and especially mass businesses such as retail. Strengthening the PoS systems with chip cards and EMV are great examples as they do not store any data. It would be interesting to see how advancements in these areas take shape.
-
-
Elizabeth V Calise wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
This is a short article, but I decided to post this one because this was a past thought I had as the US was approaching Thanksgiving, Black Friday and Cyber week/ Cyber Monday. It may still be a too early for […]
-
I found a few articles on this when I was looking for an article this week. A lot of the tips given are the same ones people should always use when online such as making sure the URL is spelled correctly and don’t click links from emails without verifying the sender. Hackers are becoming increasingly sophisticated though, making their websites and emails look more and more perfect. I don’t blame people for being wary of online shopping.
-
Elizabeth,
Very interesting article. I am surprised this high percentage of Americans don’t trust online shopping. I do believe the something, we share our sensitive information all time with different individuals and that can put us under the risk to be victims. These parties sell us items are individuals and they can be scams having the goal of attacking us.
Thank you for the article.
-
-
Elizabeth V Calise wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Snowbug is a group that has been active since 2015 and seems to be highly interested in foreign policy information from diplomatic and government entities. The group’s victims include organizations in Brazil, P […]
-
Elizabeth V Calise wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
I found this article interesting since it relates to a prior discussion the class had about an organization’s data when having an international site in China. Even though China is the world’s second largest eco […]
-
Hi Elizabeth:
Very interesting article and I was very surprise that China implement another laws to restrict the internet users.
-
Elizabeth,
In my opinion this law has many advantages and disadvantages, It will give the government a control of people activities over the internet which can target any people who are trying to do something wrong. At the mean time there is a big disadvantage since this law will touch the privacy of citizens who are now afraid to speak up freely about their ideas and thoughts.
Very interesting article and a big debate can be open regarding this topic. -
what is freedom of speech? what is freedom of bear? Do you think someone doesnt need to be responsible for their words? There is no free launch. We all do know about it. If you were leader of China, what would you do in fact of 1 billion+ of population? There is no wrong or right (decision or law). Dont they want it’s the best for their citizen to get the best out of internet? We all make touch choices.
-
Hey Elizabeth,
This was a great article indeed. China has always surprised the world with its constant innovation and developments, being a closed economy. It put a ban on Google, Facebook, Yahoo, etc. to protect its internal systems. All these companies failed to make a mark and in fact, local companies in China, example, Baidu, rose up to show strength. I think all countries should have a balanced regulation in cyber threat and I would in many ways not encourage the approach that China has taken. Banning the most important networks also shows lack of development in many ways.
-
-
Elizabeth V Calise wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
A new form of cybercrime has been hitting American citizens. Recently, mobile phone account numbers are being stolen and then transferring services to a different device. Additionally, hackers have being using […]
-
Elizabeth V Calise wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
This is a short article, but I found it pretty interesting. I haven’t read many articles involving cyber attacks in Canada. This article sums up why, which I find interesting that many attacks have not been leaked […]
-
Elizabeth V Calise wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 1 month ago
Almost 60% of small businesses have been victims of a cyberattack in the past year; however, most them were not aware they were attacked. Nationwide conducted its third annual survey which included over 1,000 […]
-
Really interesting article. I think this is a real problem and we are going to be seeing it more and more moving forward. I think it comes form they simply do now have the money to properly keep up with cost of cyber security.
-
Elizabeth – Your response to Cyber-attacks on SMEs is quite interesting to read. I have to agree that SMEs definitely face a lot of challenges because of lack of resources, poor understanding of cyber security threats, and lack of capital to invest in such measures. One interesting aspect that I found in your response is the fact that the recovery is slow and expensive. This is an important point that you made because if recovery is costly, then it puts SMEs again into problems because they cannot afford enough to implement anti-malware solutions quickly. This not only affects their capital expenditure, but also the operations on the whole.
-
Elizabeth,
Sharing this type of articles is very important to educate people and small companies to think more about creating their own IT security departments that would be in charge of educating employees and protecting their IT infrastructures. I believe these types of articles give a strong sign to these small companies to think seriously about security by hiring more IT people and define a good budget to run these security departments. These companies don’t really work hard enough to secure there IT departments, especially if they are small. -
For an extreme example, an usual startup company, what is priority for them? Growing up their business, they must put resource on their priority. Data presented above only make statistical sense. There are countless small business. What makes them think they will be attacked? For bad guys, how come do they find out those nameless company? Do you think someone outside of company or someone inside of company has higher possibility find out the weakness of company?
-
- Load More