Bithumb, one of the largest Bitcoin and Ether exchange platforms, has been hacked resulting in a loss of billions of South Korean Won with a number of user accounts compromised. Information such as users’ phone numbers, email addresses, etc. have been leaked as such, reports Bravenewcoin.
If you use an app called eVestigator, billed as checking Android phones for compromise, delete it. That’s the word from someone signing their name as MaXe from InterN0T, who looked at what the Android app does. The app claimed to test Android phones to see if they’ve been compromised.
A massive malvertising network has been infecting as many as one million computers per day with a variety of geo-focused banking trojans. Named AdGholas, researchers say that it has been operating since 2015, infecting thousands of victims every day using a sophisticated combination of techniques that include filtering and steganography. It was receiving high-quality traffic from a variety of high rank referrers, from more than twenty different AdAgency/AdExchange platforms.
The personal details of a small number of Google staffers have been exposed, according to a notification letter Google has started sending to affected employees. The breach didn’t take place because of Google’s lack of security measures, but occurred off-site, via a travel and hotel reservations platform. Carlson Wagonlit Travel (CWT), one of the companies Google uses to make hotel arrangements for its employees for work-related travels, has informed the tech giant of the breach.
Hackers are selling the Medicare card numbers of Australians on the ‘dark web’, which could be used to steal private health records. The Federal Government has confirmed it’s urgently investigating the security breach and has referred the matter to the Australian Federal Police. A journalist from The Guardian revealed he was able to purchase his own Medicare card details from a vendor on the dark web for just $30, from a device called ‘the Medicare machine’.
Ripple Effects of Cyber Crime and How B2B Firms Can Overcome Them
Ways that cyber crime is impacting B2B companies — and how to overcome them, without compromising data safety or visitor security.
1. Identity theft paranoia is hampering lead capture.
For B2B sales and marketing pros, lead generation is vital to the bottom line. Due to the threat of identity theft, along with long-standing concerns about spam, prospects are increasingly reluctant to hand over their contact information. This means that traditional lead capture forms aren’t performing like they used to.
2. Concern over credit card data hacks impacts sales.
With data breaches on the rise, credit card leaks are becoming more common, and they impact both B2B and B2C ecommerce websites. Consumers are increasingly warned about posting credit card information, and that is likely preventing some of your sales. Recent massive data breaches have been all over the news, including the Target hack of 2014, which compromised some 70 million customers.
Improve customer confidence two ways. Make sure your site has updated SSL certificates and strong HTTPS encryption. Of course, this doesn’t mean that your information will be 100 percent safe 100 percent of the time, but it does make it more difficult for hackers to access any data transmitted.
3. Protecting your assets from ransomware is now a must.
Ransomware is increasingly cited as one of the year’s biggest security threats. “The days of single-target ransomware will soon be a thing of the past,” Stephen Gates, the chief research intelligence analyst at NSFCOUS, tells Tech Republic. The new generation of attacks, he notes, “will carry ransomware payloads capable of infecting hundreds of machines in an incredibly short timespan.”
4. Cookie consent is spreading beyond the EU.
Six years ago, all EU countries adopted privacy legislation to protect consumers from having their personal information tracked unknowingly. The law requires that websites let users know if they are using cookies — and get consent from site visitors to track them. Websites must also explain what data is being collected via the cookies and how it is going to be used.
5. Connected devices are extra vulnerable.
The internet of things (IoT) has made things more convenient for many, but as many as 200 billion devices will need securing by 2020. Without extra protection, it’s possible for hackers to hijack those devices to wreak havoc on computer systems.
Make sure to protect your network with IoT encryption. Use a secure boot, digital signatures and protect software with key-based signatures. Symantec, for example, offers turnkey solutions to help secure IoT.
Protect yourself and your customers.
With the rapid growth of cyber crime, businesses are presented with a number of challenges. They must demonstrate trust to consumers, while taking steps to protect data. These solutions can be put in place now to minimize future disruption.[sg_popup id=6]