Facebook Says It’s Your Fault That Hackers Got Half a Billion User Phone Numbers from r/technology
https://www.vice.com/en/article/88awzp/facebook-says-its-your-fault-that-hackers-got-half-a-billion-user-phone-numbers
Facebook has become accustomed to dealing with multiple massive privacy breaches in recent years, and data belonging to hundreds of millions of its users has been leaked or stolen by hackers.
Facebook does not plan to notify half-billion users affected by data leak from r/worldnews
https://mobile.reuters.com/article/amp/idUSKBN2BU2ZY
The July 2019 FTC settlement requires Facebook to report details about unauthorized access to data on 500 or more users within 30 days of confirming an incident.
The Facebook spokesman declined to comment on the company’s conversations with regulators but said it was in contact to answer their questions.
++++++++++++++++
more on facebook in this IMS blog
https://blog.stcloudstate.edu/ims?s=facebook
https://soundcloud.com/bloomberg-business/the-big-hack-part-1-read-aloud
Nested on the servers’ motherboards, the testers found a tiny microchip, not much bigger than a grain of rice, that wasn’t part of the boards’ original design. Amazon reported the discovery to U.S. authorities, sending a shudder through the intelligence community. Elemental’s servers could be found in Department of Defense data centers, the CIA’s drone operations, and the onboard networks of Navy warships. And Elemental was just one of hundreds of Supermicro customers.
interdiction, consists of manipulating devices as they’re in transit from manufacturer to customer. This approach is favored by U.S. spy agencies, according to documents leaked by former National Security Agency contractor Edward Snowden. The other method involves seeding changes from the very beginning.
In emailed statements, Amazon (which announced its acquisition of Elemental in September 2015), Apple, and Supermicro disputed summaries of Bloomberg Businessweek’s reporting.
The Chinese government didn’t directly address questions about manipulation of Supermicro servers, issuing a statement that read, in part, “Supply chain safety in cyberspace is an issue of common concern, and China is also a victim.” The FBI and the Office of the Director of National Intelligence, representing the CIA and NSA, declined to comment.
+++++++++++++
more on hackers in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker
Vatican enlists bots to protect library from onslaught of hackers from r/technology
Vatican enlists bots to protect library from onslaught of hackers
https://www.theguardian.com/world/2020/nov/08/vatican-enlists-bots-to-protect-library-from-onslaught-of-hackers
The library has partnered with Darktrace, a company founded by Cambridge University mathematicians, which claims to be the first to develop an AI system for cybersecurity.
+++++++++++++++
more on bots in this IMS blog
https://blog.stcloudstate.edu/ims?s=bots
+++++++++
more on hackers in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker
Six Ways to Protect Student Data and Prevent Cyberattacks
https://www.edsurge.com/news/2018-12-10-six-ways-to-protect-student-data-and-prevent-cyberattacks
School administrators and IT staff can be super-vigilant, but the hackers are getting better and better at sneaking through security.
the most common cybersecurity threats, and how can school staff avoid them?
Eavesdropping / Man-in-the-Middle (MiTM) Attacks
What they are: It’s likely that you sometimes use a school laptop or mobile device to gain internet access via Wi-Fi networks in public places like coffee shops or airports. If so, be aware that there may be hackers eavesdropping to try and gain entry to any two-party exchange you make so they can filter and steal data.
How to avoid them: Always use a school-verified SIM card, dongle or VPN(virtual private network) to access the internet in public places.
Social Engineering Attacks
According to Verizon’s 2018 Breach Investigations report, 92 percent of malware is delivered via email, often referred to as social engineering attacks. The aim is to interact with the user and influence and manipulate their actions to gain access to systems and install harmful software. Malware uses various guises. Here are some of the most common:
1. Phishing emails
2. Baiting attacks
3. Quid pro quo requests
4. Pretexting attacks
5. Contact with a ‘compromised’ website
Hackers may be able to tap into your office phone
https://www.facebook.com/techinsider/videos/909575759240781/
+++++++++++++++++++++
more on privacy:
https://blog.stcloudstate.edu/ims?s=privacy
more on hackers:
https://blog.stcloudstate.edu/ims?s=hack
Keeping Safe in a Digital World
How Not to be Hacked
Malware, Phishing, Hacking, Ransomware – oh my! Learn about the threats to you, your users and your library. During this session, we will explore the threats to online security and discuss solutions that can be implemented at any level. Most importantly, we will look at how we can educate our users on current threats and safety
Date: December 5th, 10AM
Presenter: Diana Silveira
Register: https://netforum.avectra.com/eweb/DynamicPage.aspx?Site=SEFLIN&WebCode=EventDetail&evt_key=bec597af-02dd-41a4-9b3a-afc42dc155e4
Webinar December 5, 2017 10 AM
- create policies. e.g. changing psw routinely
- USB blockers for public computers (public libraries). like skimmers on gas stations
- do not use admin passwords
- software and firmware updates.
- policy for leaving employees
- HTTP vs HTTPS
- Cybersecurity KNowledge Quiz Pew research Center
http://www.pewinternet.org/quiz/cybersecurity-knowledge/
diana@novarelibrary.com
slideshare.net/dee987
facebook.com/novarelibrary
twitter @Novarelibrary
+++++++++++
more on hacking in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker
Edmodo Investigates Millions of User Accounts for Sale on Dark Web
By Sri Ravipati 05/12/17
https://thejournal.com/articles/2017/05/12/millions-of-edmodo-user-accounts-for-sale-on-dark-web.aspx
A hacker going by the name “nclay” claims to have stolen more than 77 million user accounts from Edmodo
LeakBase yesterday Tweeted that the top domains for the data breach include:
- @gmail.com, accounting for 19 percent of the accounts at 13,286,240;
- @hotmail.com, making up 10 percent of the accounts at 7,065,761; and
- @yahoo.com, at 8 percent with 6,074,901 accounts.
+++++++++++++++++++++
more on Edmodo in this IMS blog
https://blog.stcloudstate.edu/ims?s=edmodo