• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.701 ■ Fall 2024 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Zoom link

In The News

October 9, 2024 by David Lanter 13 Comments

Filed Under: Unit 08: Case Study 3 - A Hospital Catches the "Millennium Bug" Tagged With:

Reader Interactions

Comments

  1. Christopher Williams says

    October 12, 2024 at 10:53 am

    20 Years Later, the Y2K Bug Seems Like a Joke—Because Those Behind the Scenes Took It Seriously

    This article goes through the events of Y2K, a time when people feared that computers would fail as the year 2000 approached. On December 31, 1999, John Koskinen, who led the U.S. Y2K efforts, flew to New York to show that everything would be fine when the new year arrived. The issue was caused by older computer systems using only two digits for the year, making people worry that when the year switched from 1999 to 2000, computers might think it was 1900, causing errors like financial miscalculations or power outages.

    While some people panicked and stocked up on supplies, experts and programmers had been preparing for years. About $100 billion was spent in the U.S. alone to prevent any issues, and thanks to their efforts, the new millennium started without major problems. Although Y2K became a joke afterward, the article points out that many programmers worked tirelessly to fix the issue but received little recognition for their work. Some of the fixes they implemented are still being used today.

    In my opinion, Y2K shows how careful planning and behind-the-scenes work can prevent disasters, even when the public doesn’t always see the value in it at the time. The fact that nothing happened is a testament to how well-prepared everyone was.

    https://time.com/5752129/y2k-bug-history/

    Log in to Reply
  2. Brittany Pomish says

    October 14, 2024 at 9:36 pm

    Title: Hacked Ecovacs robot vacuums go berserk yelling racial slurs and chasing dogs

    Owners of Ecovacs Deebot X2 robot vacuums reported a hacking spree, which spanned a few days in multiple US cities. Some users told ABC that their robots sounded like broken-up radio signals, and the Ecovacs app revealed that an attacker was accessing the live camera feed and remote control feature. Despite resetting the password and rebooting the robot, the erratic behavior soon started again.

    Security researchers had previously notified Ecovacs of significant security flaws. One affected the Bluetooth connector, allowing complete access to the X2 model from over 100 meters away. Another faulty system was the PIN code protecting the robot’s video feed and remote control feature. Hackers managed to disable the warning sound that should play when the camera is being used.

    Ecovacs issued a patch and plans to release a firmware update in November to enhance security. Users are advised to use strong, unique passwords and improve their WiFi security.

    https://cybernews.com/news/hacked-ecovacs-robot-vacuums-yelling-racial-slurs/

    Log in to Reply
  3. Nelson Ezeatuegwu says

    October 14, 2024 at 11:43 pm

    Italy’s Intesa said it alerted authorities on security breach after checks

    Italy’s Intesa Sanpaolo said it had been able to alert the country data protection authority about the data violation performed by one of its employees only after carrying out careful and extended checks on the events. Intesa said it had not yet received any information from prosecutors, after news agency ANSA reported the bank had been placed under investigation alongside its employee following the alleged data breach affecting thousands of account holders including Prime Minister Giorgia Meloni. The news is still breaking, i will keep the class posted as the investigation unfolds.
    https://www.reuters.com/technology/cybersecurity/italys-intesa-said-it-alerted-authorities-security-breach-after-checks-2024-10-14/

    Log in to Reply
  4. Neel Patel says

    October 15, 2024 at 10:06 am

    Taiwan Visitors exposed in massive hotel booking data leak

    OwlTing is a blockchain technology solution company. They exposed the personal data of 765,000 users, mostly hotel guests in Taiwan. This was attributed to improperly configuring their Amazon S3 bucket. This leak revealed sensitive information like full names, phone numbers, and hotel booking details. This made users vulnerable to identity theft and fraud. Though OwlTing downplayed the severity, the exposed data posed significant risks, especially through phishing and social engineering attacks. The incident highlights the critical need for robust and effective security measures when it comes to sensitive data on cloud platforms.

    https://cybernews.com/security/taiwan-visitors-exposed-in-massive-data-leak-owlting/

    Log in to Reply
  5. Benjamin Rooks says

    October 15, 2024 at 4:45 pm

    The Hidden Costs of Maintenance in the Cost Breakdown Equation

    Since Christopher took the topic that I really wanted to talk about *shakes fist* this topic is the other thing that came to my mind as I was working on the case study. Throughout my career getting buy-in on maintenance has been one of the most challenging continuous issues I have faced. In our current economic system where value is generated by creating new and exciting ways to generate growth and attract investors, we as auditors and security professionals can regularly find ourselves fighting an uphill battle for support around maintaining systems. Because of that I think that it is more important then ever to find a way to best express the cost of failing to maintain systems to leadership.

    https://fastercapital.com/content/The-Hidden-Costs-of-Maintenance-in-the-Cost-Breakdown-Equation.html

    Log in to Reply
  6. Andrea Baum says

    October 15, 2024 at 7:28 pm

    North Korean spy successfully managed to infiltrate cybersecurity training firm using stolen credentials and a fake VPN — here’s how you could avoid becoming a victim

    https://www.techradar.com/pro/north-korean-spy-successfully-managed-to-infiltrate-cyber-security-training-firm-using-stolen-credentials-and-a-fake-vpn-here-s-how-you-could-avoid-becoming-a-victim

    KnowBe4, a cybersecurity awareness company, recently discovered it had inadvertently hired a North Korean spy, highlighting the vulnerabilities in modern remote hiring processes. Despite conducting rigorous background checks and video interviews, the individual bypassed security measures, which only came to light when malware was detected on the company-issued laptop. The incident underscores the growing sophistication of fraudsters, using advanced techniques to create false identities. KnowBe4 emphasizes the importance of recognizing red flags during recruitment, such as inconsistencies in candidates’ backgrounds, reluctance to participate in video interviews, or lack of a digital footprint. To mitigate such risks, companies should implement measures like Multi-Factor Authentication (MFA), pre-configured secure devices, zero-trust policies, and thorough identity verification. KnowBe4 shared this experience to help other organizations strengthen their security practices.

    Log in to Reply
  7. Aisha Ings says

    October 15, 2024 at 7:30 pm

    A new ‘super-realistic’ AI scam could get your Gmail account hacked

    This new AI scam targets Gmail users by enhancing traditional phishing techniques with AI-generated voices, making the scam more convincing and increasing its success rate. Scammers send messages asking users to restore their Gmail accounts and follow up with calls that appear to come from Google support, warning of suspicious activity. The realistic AI-generated voice and a phone number that may link to a genuine-looking Google business page make it challenging to identify the scam. Users should be wary of unsolicited calls, urgent requests, and demands for sensitive information, as Google does not typically contact users by phone for security issues.

    https://www.msn.com/en-us/news/technology/a-new-super-realistic-ai-scam-could-get-your-gmail-account-hacked/ar-AA1sjfPF?ocid=msedgntp&pc=U531&cvid=ca4de32011764a63ba3650c1e4f8e8ae&ei=39

    Log in to Reply
  8. Cyrena Haynes says

    October 15, 2024 at 9:08 pm

    India’s Star Health says it received $68,000 ransom demand after data leak

    A significant data breach has occurred, resulting in the unauthorized exposure of sensitive information, including tax details and medical records. This breach was facilitated using Telegram chatbots and a dedicated website. In response to this alarming incident, the insurer has taken legal action against both Telegram and the individual believed to be responsible for the hacking. Despite the serious nature, Telegram has not fully complied with the company’s requests to ban the accounts associated with the hacker. While some chatbots have been removed from the platform, the lack of complete cooperation has raised further concerns. In an effort to strengthen its response, the insurer is also seeking support from Indian cybersecurity authorities to help identify the hacker and mitigate any further risks associated with this breach.

    Source: https://www.reuters.com/world/india/indias-star-health-says-it-received-68k-ransom-demand-after-data-leak-2024-10-12/

    Log in to Reply
  9. Vincenzo Macolino says

    October 15, 2024 at 9:44 pm

    LockBit ransomware leaks gigabytes of Boeing data

    In October of 2023 a cybercrime gang compromised Boeing with a ransomware attack and threatened Boeing to pay them within 6 days or they would leak sensitive data. The ransomware attack affected parts and distribution so luckily no flights were affected. However the ransomware group, LockBit, came out and said that they were negotiating with Boeing for a few days until eventually Boeing stopped communicating with the group. LockBit eventually published 43GB of data that included files for configuration backups for IT management software, and logs for monitoring and auditing tools. As a result, other organizations such as the U.S. branch of ICBC and DP world were affected. LockBit was able to exploit a vulnerability in Citrix’s software, known as Citric Bleeed, which is what allowed them access to Boeing’s systems. The incident resulted in the CISA and FBI urging organizations to patch the Citrix Bleed vulnerability as soon as possible.

    https://www.bleepingcomputer.com/news/security/lockbit-ransomware-leaks-gigabytes-of-boeing-data/#:~:text=LockBit%20ransomware%20has%20leaked%20more%20than%2043GB%20of,recent%20of%20them%20with%20an%20October%2022%20timestamp.

    Log in to Reply
  10. Ericberto Mariscal says

    October 15, 2024 at 9:47 pm

    Title: Online Scammers Looking to Cash In on Hurricane Milton Disaster

    In the wake of Hurricane Milton, officials are warning consumers to be on the lookout for scammers in person and online. The department of Justice and the Consumer Financial Protection Bureau warned that scammers will target those affected by the storm, as well as well-meaning people trying to help them in the form of fraudsters impersonating hurricane-aid charities. The cybersecurity and Infrastructure Agency released a separate advisory warning of potential online scams that could come in the form of emails, messages on social media, texts, phone calls or even a knock on their door from an actual person. They list the following to avoid natural disaster scams

    -If someone says you have to act now, don’t.
    -Take a close look at email addresses and URLs
    -Only give to verified charities
    -Stick to trusted sources for storm advice.
    -Say no to “officials” who ask for money
    -Help others by reporting scams

    Link: https://www.msn.com/en-us/news/other/federal-officials-warn-of-scammers-looking-to-cash-in-on-hurricane-milton-disaster/ar-AA1rZcRe?ocid=BingNewsSerp

    Log in to Reply
  11. Tache Johnson says

    October 15, 2024 at 10:45 pm

    In a recent cyberattack, hackers took control of robot vacuums in several U.S. cities. The robots ‘Ecovacs Deebot X2’ type, which was made in China. Attackers took control of the robots from afar and used their cameras and mics to scream racial slurs at the owners. In one case, a thief got into the live feed and audio of a vacuum for a family in Minnesota, which raised concerns about privacy breaches. There were reports of several similar hacks happening in different places, which made people worry about a known security hole in the device. Even though cybersecurity experts had warned them about the weakness before, Ecovacs didn’t do enough to fix it, which led to these leaks. Later, the company admitted that it had been hacked and blamed weak security measures and attacks that used stolen credentials. They promised that there would be changes in the future. But some customers said Ecovacs was wrong for downplaying how bad things were and not telling them about the problems. The story talks about how important hacking is for smart home gadgets and the problems that could happen if they aren’t protected properly.

    Article: https://www.abc.net.au/news/2024-10-11/robot-vacuum-yells-racial-slurs-at-family-after-being-hacked/104445408

    Log in to Reply
  12. Gbolahan Afolabi says

    October 15, 2024 at 11:59 pm

    Cybersecurity Firm Warns Of Threats To 2024 Presidential Election Integrity

    This article details the risk of cyberthreats related to the 2024 presidential election. It warns the public of AI impersonation and ransomware attacks that originate from sending phishing emails and media while impersonating presidential candidates and result in ransomware attacks. The article also documents adversaries such as Russia, China, North Korea, etc. as sponsoring espionage attempts on the government ahead of the 2024 election. Lastly, the article gives advice for the use of safeguards such as multi factor authentication, strong passwords, and vigilance to combat the vulnerabilities that are often targeted by threat actors.

    Source: https://www.benzinga.com/government/24/10/41346351/cybersecurity-firm-warns-of-threats-to-2024-presidential-election-integrity

    Log in to Reply
  13. Dawn Foreman says

    October 16, 2024 at 11:28 am

    Xfinity hack affects nearly 36 million customers. Here’s what to know.
    https://www.cbsnews.com/news/xfinity-hack-customers-usernames-passwords/

    Comcast uses a cloud computing company called, Citrix. Citrix recently patched a vulnerability in the system earlier in the month (October 2023). Xfinity learned that unauthorized users gained access to its internal systems between Oct. 16 and Oct. 19, gaining access to 35.8 million individuals confidential information such as their names, contact information, account usernames and passwords, birthdates, parts of their Social Security numbers and answers to their security questions. All Xfinity customers were required reset their usernames and passwords and encouraged to use two-factor authentication to secure their accounts.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (1)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (2)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in