Expect a record number of travelers to take to the skies over the upcoming holiday season. Between November 20th and December 1st, 2015, an additional 65,000 people more than the daily average flew to destinations all over the world. Many travelers rely on banked frequent flyer miles to pay for their trips. But, some cyber criminals are preventing their victims from making it off the ground.
American Airlines AAdvantage, Delta SkyMiles, and United MileagePlus are among some of the big carriers’ travel rewards programs. They offer similar benefits such as free trips, seat upgrades, free checked baggage and early boarding in return for customer loyalty. Some programs allow customers to redeem miles for car rentals or hotel stays. Records containing trip information, mileage, and how rewards are [...]
Cisco’s Cloud Service Platform customers received word of exposures that could severely risk their data’s privacy. In September 2016, Cisco informed their virtual networking clients of the discovery that more than 840,000 devices are open to two serious vulnerabilities. Fortinet customers’ data were also exposed in the theft. These exploits can lead to man in the middle attacks around the globe.
A group identifying itself as Shadow Brokers allegedly stole exploits from Equation Group, linked to the National Security Agency three years ago. Using a Twitter account, Shadow Brokers recently announced an auction for firewall exploits they claim they found with a hacking tool used by the NSA. The group demanded Bitcoins in exchange for data with codenames such as EPICBANANA, EGREGIOUSBLUNDER, AND EXTRABACON.
One of the exploits that targets Cisco ASA, Cisco Firewall Services [...]
There are many methods of guarding private data, and oftentimes companies still need to preserve the data’s utility while doing so. This is especially crucial for enterprises that process data for business without the complexity and time it takes for cryptographics. IT professionals should be aware, in hiding data from view, they may be creating a completely different set of problems.
Data masking and obfuscation allow some parts of sensitive data to remain seen while hiding the entire value. The most widely seen use of masking shortens a Social Security number to the last four digits. Masking also takes place when [...]
A previous CIPPGuide.org article addressed the ongoing investigation into former US Secretary of State and potential Democratic Party Presidential Nominee Hillary Clinton’s use of a private email account and server. A Romanian hacker known as Guccifer, 44-year-old Marcel Lehel Lazar, has since stepped forward claiming he accessed Clinton’s server and emails.
Lazar was charged with two cybercrimes separate from Clinton: unauthorized computer access and identity theft. Former Secretary of State Colin Powel and previous Clinton adviser Sidney Blumenthal are the victims. Lazar accepted a plea deal in exchange for cooperating with the FBI in the future. The future may be now, [...]