Bit of a different “news story” but we’ve picked up a story on Twitter that could have some worrying privacy implications for UK consumers. Ipsos MORI is sending out mail to get UK residents to take part in an “exciting new research study that looks at how people in the UK use, consume and interact with the internet.” To take part, they’re asked to go to a website from their smartphone, computer or tablet to download the app which then asks users to allow the app to make and manage phone calls, access the location and allow it to record…
Author: ISBuzz Team
Baltimore County Public Schools fell victim to a ransomware attack last week, affecting more than 115K students. The school district, which has been relying on virtual classes to teach students during COVID-19, has cancelled classes since last Wednesday after cybercriminals shut down its IT systems. The full thread begins here: https://twitter.com/camerongray1515/status/1332314853118238720/photo/1
The Industry expert outlines 5 insightful takeaways from a new research report conducted by Enterprise Strategy Group (ESG): The impact of XDR in the Modern SOC. ESG’s new survey “The Impact of XDR in the Modern SOC” is out, and one thing looks clear: Extended Detection and Response (XDR) has become the catalyst for redefining security operations by making them more accurate and agile. The survey addresses the main gaps for CISOs and SOC analysts in threat detection and response, including: data processing and analytics for exponentially growing telemetry generated by siloed security products, as well as different perceptions around XDR. As cautious and…
It was reported that, over the weekend, Delaware County, Pennsylvania has paid a $500,000 ransom after their systems were hit by the DoppelPaymer ransomware.
Experts Insight on the recent news regarding New Zealand’s Privacy Laws which delivers six major changes which are: 1. Reporting obligation for new privacy breach; 2. Criminal offence to access someone’s private information without entitlement (fines up to $10,000); 3. Compliance notice to businesses or organizations to comply with Privacy Act 2020; 4. Providing access to individuals whoes information is held by bsuinesses or organizations; 5. Disclosing private information of individuals sent overseas; 6. Overseas businesses or organizations doing business in New Zealand also have to comply with Privacy Act 2020 even if no physical presence.
Organizations’ adoption of virtualization is on the rise. In its 2020 State of Virtualization Technology report, Spiceworks found that more than half of businesses anticipated they would begin using storage virtualization and application virtualization by 2021. The survey also found that desktop, data and network virtualization technologies would all experience double-digit growth over the next couple of years. As they deepen their embrace of virtualization, organizations might decide they want to adopt software technologies that run in a virtualized environment. Two of the most common types of these technologies are containers and virtual machines (VMs). This begs an important question:…
Did you know today is Computer Security day? The first time this day was celebrated was in 1988 and a lot has changed since then with Cybercriminals techniques growing more and maybe ore sophisticated every year – but how can we stay safe whilst working?
It’s been reported that InterSloth’s ‘Among Us’ is being used by hackers to distribute malware. Among Us one of the latest games to be hitting the world by storm, with it being popular among PC and mobile gamers alike. Cybercriminals have noted the games popularity and begun to take advantage of it, creating fake versions of the game in order to distribute malware. New research from the app protection firm Promon, who have partnered with Wultra, has shown that there are over 60 fake ‘Among Us’ apps masquerading as the original game. The research found that there appear to be at least nine…
Black Friday is upon us, and smart doorbells may well be off the wish list following this week’s news of their IoT vulnerabilities. But all other IoT devices will fly off shelves today. As the IoT booms to billions of devices in millions of homes, the smart assistants, speaker systems, and even kids’ toys consumers happily buy today could come back to bite them. If poorly secured, any connected device purchased today can become the perfect doorway for cybercriminals to access systems and steal lucrative data to sell on the dark web or use for their own gain.
It has been reported that a data breach at NHS Highland has led to the personal information of 284 patients with diabetes being shared with more than 30 people. The error, which occurred on Tuesday, November 17, led to the names, dates of births, contact information, and hospital identification numbers of the patients being revealed. The information had been stored in a spreadsheet and included recorded notes of when patients attended or were offered training. NHS Highland referred itself to the Information Commissioner’s Office (ICO) over the incident the following day and has contacted patients affected via a letter. No personal…