Cyberlaw
House Passes Privacy-Preserving Bill, but Biden Blasts it
Richi Jennings | | 4th Amendment, adtech, Advertising and AdTech, Biden, Biden administration, Biden-Harris, Congress, congressional legislation, Data Broker, Data broker regulations, Data Brokers, foreign adtech, Fourth Amendment, Fourth Amendment is Not For Sale Act (FANFSA ), H.R. 4639, House of Representatives, Joe Biden, national security, national security policy, President Biden, SB Blogwatch, US Congress, White House
Are you a FANFSA fan? The White House isn’t. It says the bill “threatens national security.” ...
Security Boulevard
Chatting with Theresa Payton: A Closer Look at Cybersecurity and Digital Innovation
Hey all! I want to share some highlights from a truly engaging talk at the latest Arkose Accelerate with Theresa Payton, former White House CIO and a noted cybersecurity expert. Theresa recently ...
SIM Swappers Try Bribing T-Mobile and Verizon Staff $300
Richi Jennings | | 2fa, 2FA bypass, 2FA Flaws, 2FA policies, 2FA/MFA, bypass 2FA, Industry Insider, Insider, Insider attack, Insider Attacks, insider breach, Insider Fraud, insider risk, malicious social engineering, MFA, MFA hacks, mfa login, MFA Methods, Multi-Factor Authentication, Multi-Factor Authentication (MFA), Multifactor Authentication, SB Blogwatch, SIM swap, sim swap fraud, SIM swap scams, SIM swapping, sms scam, SMS scams, SMS Spam, SMS Spamming, social engineeering, T-Mobile, t-mobile breach, t-mobile data breach, T-Mobile hack, two factor authentication, two-factor-authentication.2fa, verizon, verizon data breach, Verizon Wireless
Not OK: SMS 2FA — Widespread spam targets carrier employees, as scrotes try harder to evade two-factor authentication ...
Security Boulevard
Online Health Firm Cerebral to Pay $7 Million for Sharing Private Data
Cerebral, accused by the FTC of sharing sensitive information of over 3.2 million users with third parties, is now banned from using health info for advertising purposes ...
Security Boulevard
Cybercrime Predictions from an Industry Veteran: Tom Cornelius
The cyber threat landscape is ever-evolving, with criminals employing increasingly sophisticated tactics to infiltrate and exploit businesses. But what if the very people tasked with protecting organizations against these threats are engaging ...
Ex-Security Engineer Gets Three Years in Prison for $12 Million Crypto Hacks
Prosecutors noted the need for deterrence as the amount of money stolen in crypto exchange frauds piles up ...
Security Boulevard
Sisense Hacked: CISA Warns Customers at Risk
Richi Jennings | | Amazon Web Services (AWS), aws, AWS access keys, AWS bucket, cisa, CISA Advisories, CISA Advisory, CISA Alert, CISA warning, CISA.gov, depth, NSA/CISA, Sangram Dash, SB Blogwatch, Sisense
A hard-coded credential catastrophe: The analytics firm kept big companies’ secrets in an insecure AWS bucket. Government says victims include the “critical infrastructure sector.” ...
Security Boulevard
The Evolving Triad of Cyber Threats: BEC, Ransomware, and Supply Chain Attacks
Historically, cybercriminals have been happy to stick with proven tactics for as long as possible. After all, it's a business to them—if it ain't broke, why fix it? However, this is not ...
Here Comes the US GDPR: APRA, the American Privacy Rights Act
Richi Jennings | | American Data Privacy and Protection Act, APRA (American Privacy Rights Act), Cathy McMorris Rodgers, Consumer privacy rights, customer privacy, EU GDPR, GDPR, GDPR (General Data Protection Regulation), gdpr legislation, Maria Cantwell, Privacy, SB Blogwatch
Enter the lobbyists: A draft federal privacy act has Washington DC buzzing. But it’s just a bill—and it’s a long, long journey before it becomes a law ...
Security Boulevard
FCC: Phone Network Bugs Must Be Fixed — But are SS7/Diameter Beyond Repair?
Richi Jennings | | Big Telecom, carrier, Carriers, Diameter, digital telecom, fcc, FCC Failures, FCC Follies, FCC privacy rules, Federal Communications Commission, Federal Government, Location, location access risks, location data, Location data privacy, location history, location intelligence, location privacy, location sharing location tracking, location tracking, mobile carrier, mobile carrier vulnerability, Mobile carriers, Mobile Location Tracking, Mobile Tracking, Phone Carrier, RADIUS, roaming, Ron Wyden, SB Blogwatch, Sen. Ron Wyden, Smartphone Location Tracking, ss7, telco, Telecom, Telecom Cybersecurity, Telecom Industry, Telecom Industry Vulnerabilities, telecommunications, Telecommunications Security, telephone, telephones, U.S. Federal Communications Commission, wireless carrier
Fast enough for government work: The Federal Communications Commission is finally minded to do something about decades-old vulnerabilities ...
Security Boulevard