Links in “Cybersecurity/Data Breaches”
- New âShimmerâ Device Can Read EMV Card Data
A new device has been found in use in ATMs in Mexico that can read data directly off of a chip-enabled debit or credit card. The âshimmerâ as itâs being called, acts as a shim between the EMV chip and the chip reader, and records the chip data as itâs being read by the ATM. [8/14/15]
- Breach Notifications Delayed for Government Workers
The Office of Personnel Management has requested bids from private contractors to provide government-wide identity monitoring data breach response and protections services. As a result, current and former federal government workers may not receive breach notifications until Thanksgiving. [8/14/15]
- Service That Offers Secret Text and Chat Room Messages Gets Some Unwelcome Attention
What would you say if you knew your message could never be publicly exposed? A communications company that might be touting its technology as a way to "reduce compliance and enforcement concerns" through a system that prevents "government spying" is getting some attention from U.S. Senator Elizabeth Warren. [8/11/15]
- $5 of Every $100 Spent on Fraud
Fraud growth is accelerating at a faster pace than purchase volume. Unfortunately, more than $5 of every $100 spent worldwide was spent on fraudulent transactions, with the majority of those transactions occurring in the United States. [8/10/15]
- Watch Out For âMasque Attacksâ
âMasque attacksâ are the latest malware that uses vulnerabilities in the Apple mobile operating systems to steal personal information and send it to a remote server. The malware looks like popular apps like Facebook, Twitter, and Google Chrome and is installed when a user clicks on a link in an email, text message, or fake advertisement. [8/10/15]
- CFPB Participates in Civic Hacking
People from all over participated in National Day of Civic Hacking, where technology enthusiasts are invited to provide input on government information. The CFPB participated and received input regarding its consumer complaint database and public HMDA database. [7/30/15]
- No Match for the Russian Cyber Underground
In terms of sheer sophistication and professionalization, there is no match for Russia's arsenal of illicit cyber capabilities. "These guilds of thieves are also being called upon to act as an online militia supporting Russia during times of geopolitical tension." [7/30/15]
- Could Regulatory Attention to Cybersecurity Actually Be Increasing?
The top former New York bank supervisor called cybercrime "a huge threat to our financial system" and predicts that regulators will be stepping up enforcement efforts. [7/29/15]
- The First 24 Hours: Elements of an Effective Data Breach Response Plan
What would happen at your financial institution during the crucial first 24 hours after a data breach is discovered? Your plan should be well-defined, concise and rehearsed, much like a fire drill. [7/28/15]
- Was the JPMorgan Attack Part of a Larger Scheme?
Four have been arrested in connection with a series of fraudulent investment schemes involving penny stocks and Bitcoin that spanned the globe. Authorities suspect that some of the men arrested also had a hand in last summers hacking of JPMorgan, which compromised ht econtact information for 83 million bank customers. The huge compute attack may have been an attempt to fuel an ongoing pump-and-dump stock scheme. [7/22/15]