After three weeks of city data being encrypted in Riviera Beach, Florida, city officials have unanimously voted to pay the hefty ransom to regain access. 
                    
			            - By Kaitlyn  DeHaven
 - Jun 21, 2019
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Through the BlueKeep vulnerability, it is possible to achieve remote code execution on vulnerable devices. Since the virus can spread, if it’s not contained, it could trigger a much bigger problem.
                    
			            - By Kaitlyn  DeHaven
 - Jun 20, 2019
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    In March, the department announced that 350,000 clients had been affected by a data breach in January 2019. On Tuesday, they updated the number and announced that 645,000 clients had been affected. 
                    
			            - By Kaitlyn  DeHaven
 - Jun 20, 2019
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    In May, EatStreet experienced a data breach that compromised certain customers', restaurants', and deliverers' information. The service just recently disclosed the security breach. 
                    
			            - By Kaitlyn  DeHaven
 - Jun 19, 2019
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A year after a privacy researcher showed the world that Venmo transactions could be easily accessed, a computer science student scraped seven million Venmo transactions to increase awareness of the issue.
                    
			            - By Kaitlyn  DeHaven
 - Jun 19, 2019
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    It was previously believed that North Korean hackers were behind the January 2018 Coincheck hack, but recent developments in the investigation suggest that Russian actors may have been responsible. 
                    
			            - By Kaitlyn  DeHaven
 - Jun 18, 2019
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Yubico discovered a hardware flaw in YubiKey FIPS Series devices in mid-March and since then, has updated the firmware version to one that does not contain the bug, as well as replaced the majority of affected devices. 
                    
			            - By Kaitlyn  DeHaven
 - Jun 17, 2019
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Researchers at CyberMDX uncovered two vulnerabilities in older versions of an infusion pump that could allow hackers to gain control over the onboard computer. 
                    
			            - By Kaitlyn  DeHaven
 - Jun 17, 2019
 
		            
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    Tavis Ormandy, one of Google’s “Project Zero” team’s security researchers discovered a vulnerability that could effectively perform a denial-of-service attack on Windows servers. There is a 90-day disclosure deadline associated with Project Zero, and since it was day 91, Ormandy released the information. 
                    
			            - By Kaitlyn  DeHaven
 - Jun 14, 2019
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Managing the traditional limitations of time and resources means that running a small business on a budget is a challenge, but these difficulties become more pronounced when resources are stretched even further by the increased security demands of new technology. 
                    
			            - By Terry  Hearn
 - Jun 14, 2019
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Kapersky security researchers have identified a new phishing attack that takes place in Google Calendar. Threat actors send a Google Calendar invitation to a user that contains a malicious link hosting a phishing URL.
                    
			            - By Kaitlyn  DeHaven
 - Jun 13, 2019
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Bromium®, Inc. has announced the findings of ‘Behind the Dark Net Black Mirror,’ a study that showed the growing risk posed by the dark net to the enterprise. 
                    
			            - By Kaitlyn  DeHaven
 - Jun 13, 2019
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    It’s often thought that because the servers are behind lock and key and/or in a data center, and because the data is in continuous use, encrypting the server drives isn’t needed since the data is never at-rest.  
                    
			            - By Garry  McCracken
 - Jun 12, 2019
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A subcontractor of U.S. Customs & Border Protection transferred images of travelers and license plates to its network without CBP’s authorization or knowledge. He was subsequently hacked, and the information was compromised. 
                    
			            - By Kaitlyn  DeHaven
 - Jun 12, 2019
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Apple has “you control your data" for a while now, but with these new updates, the data is almost completely the consumers’.
                    
			            - By Kaitlyn  DeHaven
 - Jun 06, 2019
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    LabCorp reported that about 7.7 million patients’ personal information may have been compromised in the AMCA data breach. 
                    
			            - By Kaitlyn  DeHaven
 - Jun 06, 2019
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    No matter how good an organization’s perimeter defenses and threat detection systems are, it really is just a matter of when it will get breached. 
                    
			            - By Tom  Hickman
 - Jun 06, 2019
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The AMCA said they hired a third-party external forensics firm to investigate the Quest Diagnostics data breach
                    
			            - By Kaitlyn  DeHaven
 - Jun 05, 2019
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Quest Diagnostics has warned its 12 million customers that their personal, financial and medical data may have been exposed.
                    
			            - By Sydny  Shepard
 - Jun 04, 2019
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The endlessly growing mountains of personal, private data collected as part of routine transactions in our digital world continue to be a target for cybercriminals, who are moving beyond digital theft to the real world by targeting the servers that contain this data.