SNIPER NEWS

Hilton Reaches $700,000 Settlement Over Two Data Breaches

Breach Notification , Compliance , Data Breach Hotel Chain Waited 9 Months to Warn Customers After Discovering First Breach Mathew J. Schwartz (euroinfosec) • November 1, 2017     Hilton Hawaiian Village Beach Resort & Spa. (Photo: Hilton) Global hotel chain Hilton has reached a $700,000 settlement agreement with two states over two separate data

Read More »

“Catch-All” Google Chrome extension rigged to steal user data, including credit card information

Another day, another rogue Google Chrome add-on found making the rounds, looking to steal your private data.  A SANS ISC incident contributor has spotted a Chrome extension being pushed onto users via a phishing e-mail. The scam uses links to photos purportedly sent through WhatsApp, the popular messaging service. Renato Marinho explains that Following a photo link,

Read More »

How to Stop Robocalling: The new Telephony Denial of Service (TDOS)

In a Robocall Strike Force Report in October, the Federal Communications Commission said telemarketing calls were the No. 1 consumer complaint. Citing statistics from YouMail, a developer of robocall-blocking software, the commission said consumers received an estimated 2.4 billion robocalls per month last year, driven in part by internet-powered phone systems that have made it

Read More »

WiFi WPA2 protocol used in our every day Wireless lives has been Hacked!

Aurich Lawson / Thinkstock reader comments 215 Share this story Researchers have disclosed a serious weakness in the WPA2 protocol that allows attackers within range of vulnerable device or access point to intercept passwords, e-mails, and other data presumed to be encrypted, and in some cases, to inject ransomware or other malicious content into a

Read More »

WiFi WPA2 has now been Hacked!

At about 7AM ET this morning, researchers revealed details of a new exploit called KRACK that takes advantage of vulnerabilities in Wi-Fi security to let attackers eavesdrop on traffic between computers and wireless access points. The exploit, as first reported by Ars Technica, takes advantage of several key management vulnerabilities in the WPA2 security protocol,

Read More »

Ransomware: The Threat is Real…

Ransomware is a growing criminal activity involving numerous variants. Since 2012 when police locker ransomware variants first emerged, ransomware variants have become more sophisticated and destructive. Some variants encrypt not just the files on the infected device, but also the contents of shared or networked drives, externally attached storage media devices, and cloud storage services

Read More »

2016 Cybersecurity Statistics

 2016 was an alarming year for tallying increases in data breaches and analyzing the sophistication of cybersecurity attacks and threats. It is clear that companies and individuals are playing games of catch up from a growing array of cyber adversaries. The following links are compiled from recent statistics pulled from a variety of articles and

Read More »