Friday Five: 2/27 Edition

Your Weekly Roundup of information security news.

Happy Friday! Close out the month of February with our picks for this week’s top articles from the IT and security presses:

  1. From Hacking Systems To Hacking People” by Larry Ponemon
    By the year 2020, the “digital universe” is predicted to be forty-four trillion gigabytes. You may think that by then data security will be at a point in which it is very difficult for hackers to carry out attacks. However, hackers are constantly coming up with new ways to infiltrate the databases of companies. Read this article to find out a simple way cybercriminals are able to hack people through visual and social engineering methods.
  2. LinkedIn settles class action suit over 2012 unsalted password leak” by Lisa Vaas
    Back in 2012 a $5 million class action lawsuit was filed against LinkedIn in response to them failing to use industry standard security practices, which lead to the leak of millions of passwords. The case was dismissed in March 2013, but was amended and sent over to private mediation in April 2014. Check out this article to find out how this lawsuit has been settled and if you qualify for a settlement fund.
  3. 40% of firms will plan for cybersecurity business disruption attacks: Report” by FirstPost Staff
    It is estimated that by 2018, 40% of large companies will have formal plans in place in regards to cybersecurity. According to Paul Proctor , vice president and distinguished analyst at Gartner, "preventive controls, such as firewalls, antivirus and vulnerability management, should not be the only focus of a mature security program. Balancing investment in detection and response capabilities acknowledges this new reality." Give this article a read for a better idea of what companies might do to improve their security policies moving forward.
  4. "PowerSpy" - can crooks really track you by the power your phone is using?” by Paul Ducklin
    GPS is not the only way crooks can track where you’re headed. Scientists have conducted studies that have found that it is possible to track the general routes of cell phones based on their power usage alone. If you want to learn more about this new and very interesting study, check out Ducklin’s article.
  5. EU and US groups sound alarm on China cyber security rules” by Christian Oliver and Tom Mitchell
    Newly proposed Chinese cyber security regulations are expected to force domestic and foreign banks to use information technology equipment that is declared “secure and controllable” by Beijing. European and U.S. companies have urged their governments to bring these new regulations to a halt as they "could close the door for many foreign IT companies to the Chinese banking IT market". For more, check out this article that includes a video of President Obama weighing in on this issue.
Brandon Vasciannie

Please post your comments here

Digital Guardian MSP Datasheet

Get the details on how our security experts work to secure your sensitive data, so you can focus on your business.

Download Now

Related Articles
Thanks For Nothing, 2017

2017 was marked by global ransomware outbreaks, seemingly countless data breaches, and little legislative movement from Congress.

Friday Five: 3/4 Edition

Catch up on this week’s top information security news.

You Down With BGP?

Attackers used a BGP leak to trick users and steal $150,000 in cryptocurrency on Tuesday.