Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Glitter bomb engineer exacts revenge on parcel thieves

Everyone else has reported this Christmas gem, why shouldn’t we? NASA engineer Mark Rober “over-engineered the crap” out of it, including motion detection, geofencing, and 4 cameras to record some priceless reactions.  Here is the YouTube video.


Dark web goldmine busted by Europol

What’s the safest way to buy counterfeit banknotes? Not on the dark web market, as 235 people have just discovered to their cost.


‘Iceman’ hacker charged with running drone-smuggling ring from jail

You gotta read this one – what a yarn!! Max Ray Vision is serving 13 years for $86 million in credit card fraud.  He says he’s innocent of owning the phone used to orchestrate the scheme and ripping off debit cards to fund the drone purchase.


CIA’s secret online network unraveled with a Google search

The US government is reeling from a catastrophic, years-long intelligence failure that compromised its internet-based covert communications.


Why don’t we just eliminate all the hackers?

A post by Peter Herzog.  Answers to most every hacker question.


ST18-007: Questions Every CEO Should Ask About Cyber Risks

12/04/2018 10:52 AM EST  Original release date: December 04, 2018

As technology continues to evolve, cyber threats continue to grow in sophistication and complexity. Cyber threats affect businesses of all sizes and require the attention and involvement of chief executive officers (CEOs) and other senior leaders. To help companies understand their risks and prepare for cyber threats, CEOs should discuss key cybersecurity risk management topics with their leadership and implement cybersecurity best practices. The best practices listed in this document have been compiled from lessons learned from incident response activities and managing cyber risk.


Those are NOT your grandchildren! FTC warns of new scam

Grandkid imposters are managing to finagle a skyrocketing amount of money out of people, the FTC warns in new alert “New Twist to Grandparent Scam:  Mail Cash.”


Unencrypted medical data leads to 12-state litigation

The Attorneys general of 12 states are suing an e-record provider who lost 3.9 million personal healthcare records in 2015.  It’s about time!  Seems like some companies never learn unless there is litigation and fines.


By the End of 2018 More Than Half the World Will Be Online

When the ball drops on New Year’s Eve, it will not only mark a new year, but a milestone for the digital age. According to estimates from ITU, the United Nations agency for information and communications technologies, more than 51.2 percent of humanity or 3.9 billion people will be online, the first time 50 percent of humanity has had access to the internet.


 

0

About the Author:

Cybersecurity analyst, pen-tester, trainer, and speaker. Serving small business owners in the St Paul, Minneapolis, and western Wisconsin area since 2001. Cybersecurity and hacking have been a passion of mine since I entered the computer and networking business in 2000. I hold several cybersecurity certifications including Certified Information Systems Security Professional (CISSP), Certified Advanced Security Pratitioner (CASP), and Certified Ethical Hacker (CEH). Other computer industry certifications include A+, Network+ and Microsoft Certified System Engineer (MCSE). As Cybersecurity Analyst at The WyzCo Group, I help our clients experience high levels of security on their computers, networks, and websites. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. We also provide Cybersecurity Awareness Training for clients and their employees. I am a frequent speakers at cybersecurity conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference, the (ISC)2 World Congress, and the ISSA International Conference, and many local community organizations, Chambers of Commerce, SCORE, and several school districts. I have been blogging on cybersecurity since 2008.
  Related Posts

Add a Comment


This site uses Akismet to reduce spam. Learn how your comment data is processed.