The Federal Emergency Management Agency wrongly released to a contractor the personal information of 2.3 million survivors of devastating 2017 hurricanes and wildfires, potentially exposing the victims to identity fraud and theft, a government watchdog reported Friday. The Homeland Security Department’s Office of Inspector General found the breach occurred when FEMA was working with a contractor that helps provide temporary ...
Read More »Author Archives: firewallfirmadmin
The Best Ways to Ensure Cybersecurity in Your Physical Space
Cybersecurity Starts at Your Front Door Let’s take a step back and ask a simple yet important question: was your physical security system designed to be cyber secure? Many physical security infrastructures were developed and implemented without considering cybersecurity for our IoT driven world. Network and communication protocols for remote control and management had assumed closed, non-public networks. However, these ...
Read More »Call for Speakers for Florida Cyber Conference 2019
Cyber Florida has announced a Call for Speakers for Florida Cyber Conference 2019 (FLCyberCon). FLCyberCon is invites experts, thought-leaders, and cyber specialists from all sectors to submit proposals for breakout sessions, panel discussions, demonstrations, case studies, interactive sessions and other unique learning opportunities for conference goers. To learn more or submit a proposal, visit FLCyberCon.com. The deadline to submit is April 26, ...
Read More »FEMA Improperly Shared Personal Information of Natural Disaster Victims
The Federal Emergency Management Agency wrongly released the personal information of 2.3 million survivors of devastating 2017 hurricanes and wildfires. A Homeland Security Department’s Office of Inspector General report found the breach occurred when FEMA was working with a contractor that helps provide temporary housing to those affected by disasters. The contractor was given names, last four digits of a Social Security ...
Read More »FlawedAmmyy: A close look at the notorious activities and capabilities of the RAT
FlawedAmmyy derives its source code from version 3 of the Ammyy Admin remote desktop software. The malware has been active since the beginning of 2016. FlawedAmmyy RAT has been rated as one of the most remote access trojans in 2018. The malware, that is active since the beginning of 2016, has been observed to be used in highly targeted email ...
Read More »Check Point Forensic Files: A New Monero CryptoMiner Campaign
By Marcel Afrahim and Charles Bettan, Endpoint Security Researchers, March 19th 2019 Sand Blast Agent Forensics team have noticed a new variant of the Monero mining malware spreading throughout organizations worldwide. Interestingly, this malware showed similarities with the infection and propagation techniques of popular trojan and ransomware attacks and made use of legitimate IT admin tools, Windows system tools and ...
Read More »Facebook admits to storing hundreds of millions of user passwords in plain text
The social media giant has revealed that a large number of user passwords were stored in a ‘readable format’ in its internal systems. Most of the passwords found belonged to users of Facebook Lite — a smaller version of the Facebook app meant for low data usage. Facebook disclosed another major privacy revelation in its platforms. In an official blog ...
Read More »Magecart group breaks into MyPillow and Amerisleep websites, potentially stealing credit card information
While MyPillow was hit with Magecart attacks in 2018, Amerisleep is said to be targeted as early as 2017. The pillow manufacturing company has reworked the site after the attack but Amerisleep is still to respond with a fix. The Magecart group — known for its notorious credit card skimming attacks, makes headlines again. This time, it has found targeting ...
Read More »Security Of Enterprise Wireless Networks
Providing enterprise network security is becoming an increasingly complex undertaking, as the number of threats emanating from the Internet continues to grow. Hackers continue to find new ways to attack systems and steal data. Dealing with these threats is highly complex. While numerous reviews like this may indicate that virtual private networks can protect you against all threats, getting on top of ...
Read More »LAW ENFORCEMENT AGENCIES ACROSS THE EU PREPARE FOR MAJOR CROSS-BORDER CYBER-ATTACKS
The possibility of a large-scale cyber-attack having serious repercussions in the physical world and crippling an entire sector or society, is no longer unthinkable. To prepare for major cross-border cyber-attacks, an EU Law Enforcement Emergency Response Protocol has been adopted by the Council of the European Union. The Protocol gives a central role to Europol’s European Cybercrime Centre (EC3) and ...
Read More »