[et_pb_section fb_built=”1″ fullwidth=”on” _builder_version=”3.13.1″ background_image=”https://www.mdsny.com/wp-content/uploads/2018/07/blocky.jpg” background_position=”center_right” background_blend=”darken” custom_padding=”0px|0px|0px|0px”][et_pb_fullwidth_header title=”Breaching News: Week of 10/19/2018″ text_orientation=”center” background_overlay_color=”rgba(0,0,0,0.42)” title_font_color=”#ffffff” _builder_version=”3.13.1″ title_font=”Droid Serif||||” title_text_color=”#ffffff” title_font_size=”37px” background_color=”rgba(255, 255, 255, 0)” background_layout=”light”][/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.0.65″ custom_padding=”12px|0px|0px|0px”][et_pb_row make_fullwidth=”on” custom_padding=”27px|1px|0px|2px” _builder_version=”3.0.65″][et_pb_column type=”4_4″ _builder_version=”3.0.65″ parallax=”off” parallax_method=”on”][et_pb_text _builder_version=”3.0.74″ text_font=”Droid Serif||||” text_font_size=”18px”]By Jen Trang Nguyen, MDS

Welcome to our series of blog posts dedicated to Cybersecurity Awareness Month! This month, we will update you with the latest security news, share some tips and tricks as well as a special announcement about our very own Cybersecurity Techxpo on October 23, 2018 here in NYC. Stay tuned!
[/et_pb_text][et_pb_image _builder_version=”3.0.74″ animation_style=”slide” animation_direction=”left” animation_duration=”500ms” animation_intensity_slide=”10%”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.0.74″ background_color=”#e8e8e8″ custom_padding=”0px|0|15px|0|false|false”][et_pb_row make_fullwidth=”on” custom_padding=”22px|0px|0|0px|false|false” _builder_version=”3.0.65″][et_pb_column type=”1_2″ _builder_version=”3.0.65″ parallax=”off” parallax_method=”on”][et_pb_text _builder_version=”3.0.74″ text_font=”Droid Serif||||” text_font_size=”18px” inline_fonts=”Droid Serif”]

This week, alongside with news about political hackings and breaches, we are exploring IoT vulnerabilities and some cybersecurity training and practice tips.

 

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.0.65″ parallax=”off” parallax_method=”on”][et_pb_image src=”https://www.mdsny.com/wp-content/uploads/2018/07/blocky.jpg” _builder_version=”3.13.1″ max_width=”51%”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row make_fullwidth=”on” custom_padding=”1px|0px|0|0px|false|false” _builder_version=”3.0.65″][et_pb_column type=”4_4″ _builder_version=”3.0.65″ parallax=”off” parallax_method=”on”][et_pb_text _builder_version=”3.13.1″ text_font=”Droid Serif||||” text_font_size=”18px”]

1. US voter records from voter databases of 19 states sold on Dark Web for $42,200

Hackers have been, and are selling citizens’ data on the dark web. This incident is particularly critical, given how close the midterm elections are. 

2. Overboard: How Tea Party Campaign Assets Were Exposed Online

The Tea Party Patriots Citizens Fund (TPPCF)’s call lists containing full names and phone numbers for over 527,000 individuals were publicly exposed in a misconfigured Amazon S3 bucket.

3. Tumblr fixes a security flaw that exposed account info

Remember Tumblr, everyone’s favorite blogging platform circa 2010? It had a bug that could allow you to obtain other people’s sensitive account information. 

4. Pokemon Go cheaters might inadvertently learn GPS spoofing 

Users who utilize Pokemon Go for fun, exercising, or socializing might have learned GPS spoofing as well. Who says gaming brings no advantages?

5. Smart speakers at work? BlackBerry security expert warns on risk

Alexa, play “Stayin’ Alive” by the Bee Gees. The smart speakers, along with other IoTs, pose security risks in the workplace.

6. Hackers Target IoT-Enabled Appliances To Spark Blackouts

Hackers can use appliances that are connected via the Internet of Things (IoT) to set off widespread blackouts, according to a study by Princeton University. Yes, they can spoof your refrigerator, washing machines, and probably your Alexa-enabled smart microwave in the future.

7. Learn lessons from attacks, says McAfee investigations chief

Organizations should treat every cyber attack as an opportunity to learn, as they can identify their infrastructure weaknesses and improve their security measures.

8. Where there is risk, there are rewards: educating for careers in cybersecurity

The cybersecurity skills gap can be closed by attracting new talent to the industry, says Marie Hattar of Keysight Technologies.

 

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row make_fullwidth=”on” custom_padding=”1px|0px|16px|0px|false|false” _builder_version=”3.0.65″][et_pb_column type=”4_4″ _builder_version=”3.0.65″ parallax=”off” parallax_method=”on”][et_pb_text _builder_version=”3.0.74″ text_font=”Droid Serif||||” text_font_size=”18px”]

 

That’s it for this week’s breaching news. Stay tuned for next week!

Don’t wait until sensitive data is already in the sticky hands of hackers to react to a breach. Stay proactive with MDS and work with us to build out a custom, company-wide security protocol that is effective and easy to maintain.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.0.74″ background_color=”#8d8c91″ custom_padding=”4px|0px|20px|0px”][et_pb_row make_fullwidth=”on” custom_padding=”10px|0px|27px|0px” admin_label=”row” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_cta title=”Pulling the plug doesn’t have to be your only security solution.” button_url=”https://www.mdsny.com/contact/” button_text=”Contact Us” _builder_version=”3.0.65″ header_font=”Droid Sans|on|||” header_font_size=”31px” body_font=”Droid Sans||||” body_font_size=”19px” use_background_color=”off” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_button=”on” button_text_color=”#2d3743″]Don’t become part of a rising statistic — ensure your company is armed against a security hack.
[/et_pb_cta][/et_pb_column][/et_pb_row][/et_pb_section]