The city of Atlanta operations had been severely crippled and pwned in March 2018, arising from a rather serious and in-depth ransomware attack. This successful attack made the city of Atlanta operations very difficult. The city is still working to recover from this (https://www.helpnetsecurity.com/2018/06/08/wi-fi-phishing-attacks/). On the tail of the issues being remediated, another attack is passively underway. A security firm has detected hundreds of WiFi phishing sites activelyInfoSec, information security, cybersecurity, cyber-security, defenses, static defenses working. Surprisingly these are located not only proximate to the city hall, but also inside of the building. The research firm also detected active attacks in the Georgia State Capital. This is located merely a few blocks away from the Atlanta City Hall.
The attack was detected by the Coronet Secure Cloud Platform. The specific phishing attacks included Evil Twins, Captive Portals, and ARP Poisoning.
This instance brings up the importance of defensive measures. A static, flat defense is not a workable solution presently. The attackers will utilize the most current methods, pivoting to which method works the best for the circumstance. This does come at a cost, however, this is much better than the costs and expenses associated with breaches.
Miel, LLC Cybersecurity Architecture, Design, and Engineering Cybersecurity architecture is a requirement in today's environment. If you don't address cybersecurity in your organization, there will be problems. Miel, LLC offers architecting and embedded systems hacking services provide proactive cybersecurity services to improve your defenses, so you aren't reactive. Miel, LLC Cybersecurity Architecture, Design, and Engineering 810-701-5511 charles.parker@mielcybersecurity.net
Showing posts with label threats. Show all posts
Showing posts with label threats. Show all posts
Wednesday, August 1, 2018
Monday, June 18, 2018
Sharing is not caring: Yes you can share too much information
There have been many instances on Facebook and other social media intent on separating the consumer from their private, confidential data. One of the latest noted was a way to choose an alternative name for yourself. The questionnaire asked for the respondent’s parent’s last name, the street they grew up on, pet’s name, and other data. To most people, this would seem to be innocuous, and a fun little game. The people put this data in, and the app responds with a new comical name for you based on the data.
What is not so funny with this activity is the consumers providing this data unknowingly have also provided, unknowingly, the much of the information an identity thief would need to steal the person’s identity and begin to leverage this. Although this is is clearly not all the data they would need to secure person’s identity, get new credit cards, or other credit, this certainly helps the criminal move along with the data they would need to perpetrate such a crime. They could also secure needed data from other sources individually or leverage this to get the other data.
Personal information should be kept personal or should be kept personal or shared only with people you know, not just a computer screen with anyone on the other end.
There has also been the relatively new form of providing too much personal data known as sharenting, or parents who decide to share too much of their children’s information social media. The parents may provide the full, legal names for their children along with birth dates as they post too much of their child’s life for everyone to see.
In both examples, the consumers and parents have a false sense of security, as they have been lulled into believing these are fine, and not an issue. The seemingly innocent act of sharing with “friends” has direct consequences at times.
Subscribe to:
Comments (Atom)