Scammers impersonating the Internal Revenue Service are emailing individuals malware to steal information, marking an escalation compared with recent schemes that used the agency in less sophisticated attacks.
The latest scam emails include links that appear similar to the IRS.gov web address but lead to compromised websites that could download software to record a victim’s keystrokes, potentially sharing passwords and other sensitive data with attackers, the IRS warned last week.
When it comes to falling prey to a phishing email scam, one study found that those working in certain industries are more likely than others.
A study released this summer by KnowBe4 found that those who work in construction are the most susceptible to phishing attacks among small-to-medium-sized businesses and the second-most likely to fall for a phish among large corporations. Workers in the hospitality industry were most likely in the large business category.
After a ransomware attack, depending on the breadth of the incident, systems affected and security measures in place, recovery time can take months – or even years. Recently, malicious actors targeted two major cities – Atlanta and Baltimore – with ransomware attacks, causing officials to surrender control of their systems, halt critical services and endure extensive reputational and financial damage.
Former DHS secretary Michael Chertoff and former NSA head Mike McConnell write for CNBC that Wednesday’s FCC spectrum upgrades are a positive step in 5G support, and bring us another step closer to a more connected internet of things. But the move also means the U.S. needs to expand it’s cyber industrial base as well as its cooperation with other countries beyond our four biggest allies, in order to avoid using products developed by companies including Huawei.
Insider threat has become one the biggest risks to businesses globally, accounting for 64% of security breaches today. With the average cost to resolve insider-related incidents reaching $2.08m per incident, it should come as no surprise that organizations are beginning to invest heavily in employee monitoring technology.
Security researchers recently revealed that a previously unknown hacker group carried out a series of attacks on government agencies in 13 countries by redirecting agency computers to hacker-controlled servers. This happened through the manipulation of domain name system (DNS) infrastructure.
And it followed a US Department of Homeland Security alert disclosing a global campaign, subsequently linked to Iran, to redirect internet traffic and steal sensitive information also by compromising DNS infrastructure. The DNS is an attractive target because it serves as a global address book, translating internet names we know into IP addresses that computers can recognize. The infrastructure supporting DNS is maintained by a number of core companies that administer internet domains, register new domain names, and host DNS “lookup” services which convert those domain names into IP addresses.
A company that claimed to use technology tools to help victims with ransomware cleanup was found to secretly be paying the ransom, while collecting a premium from their clients, according to an expose out this week. The situation brings the core dilemma of business-focused ransomware directly into the spotlight: To pay, or not to pay?
Customs and Border Protection (CBP) has been expanding its biometric programs with the use of facial recognition technology for inbound passengers, achieving early success both in identifying imposters attempting to enter the U.S. and improving the efficiency of the screening process itself.
Based on this success, the Department of Homeland Security (DHS) recently announced efforts to expand programs to those departing the U.S. with the goal of covering 97 percent of outbound international travelers in the next four years.
Rudy Giuliani's comment that there is "nothing wrong with taking information from Russians" has thrown a spotlight on an already raging debate in the United States about how far a candidate should go to win. While the Mueller report did not find that there was coordination between the Trump campaign and Russia, there is a wider issue of whether -- unwittingly -- candidates are helping malign foreign powers to achieve their goals.
We applaud the recent call by the EU Commissioner for Justice, Consumers and Gender Equality for greater coordination among the United States, Japan and Europe on policy for emerging IT technologies, particularly 5G cellular technologies and networks. Commissioner Věra Jourová told U.S. lawmakers on Thursday that it was critical for the United States and Japan to work with Europe on developing common policies and standards for 5G cellular technologies, artificial intelligence and digital privacy.