Equifax Breach, DU Data Siphon

Equifax Discloses Earlier Cybersecurity Incident, But No Details

“March breach is still shaded with uncertainty”

Equifax Inc. hired cybersecurity experts to deal with an incident on its corporate networks in March, two months before the massive hack began that it has said led to the potential compromise of personal data belonging to 143 million U.S. consumers.

Infrared signals in surveillance cameras let malware jump network air gaps

“Many networks disconnected as precaution”

Researchers have been successful in creating malware that can jump airgaps by using the infrared capabilities of an infected network’s surveillance cameras to transmit data to and from attackers. The malware prototype could be a crucial ingredient for attacks that target some of the world’s most sensitive networks that were previously thought to be safe. Militaries, energy producers, and other critical infrastructure providers frequently disconnect such networks from the Internet as a precaution.

Chinese Mobile Antivirus App Caught Siphoning User Data

“Secret data theft”

Google has removed, and then reinstated, one of the most popular mobile antivirus apps on the Play Store. The move was taken after security firm Check Point discovered that DU Antivirus Security, created by the DU Group, was secretly collecting device data from users’ smartphones. Over 10 million downloads occurred without proper security precautions.

Enterprise IT security planning: Five ways to build a better strategy

“Helpful tips for a competent defense”

Those buzzwords recommended for building a successful digital business, such as flexibility, agility and openness, don’t always fit nicely with more sober requirements like the needs of a corporate security policy. So, how can IT leaders create an approach to information security that is fit for the modern business? ZDNet speaks to five experts about the key issues CIOs face.

  1. Make cybersecurity your number one priority
  2. Understand the importance of making a commitment
  3. Embed a culture of risk management across the business
  4. Apply measures that are fit for the open world
  5. Create a long-term strategy for system integrity

Enjoy your read? Check out our other content here.

Leave a Reply

Your email address will not be published. Required fields are marked *

MSIRobot