U.S. Voting System Still Vulnerable to Cyberattacks

This article argues that despite improvements since the alleged hacking of the 2016 presidential electoral race, the U.S. elections infrastructure is still vulnerable, and many voting jurisdictions have small information technology departments that may also be responsible for running other city and town infrastructure.

Article source: https://www.npr.org/2018/05/08/599452050/the-u-s-voting-system-remains-vulnerable-6-months-before-election-day-what-now

For other news please visit the Cybertide Blog

Fearing Election Hacking, EU Leaders to Ready Sanctions

European Union leaders agreed to impose sanctions to strengthen their response to cyber attacks in future elections. Since there is a lot of misuse of voter data by domestic and international actors to sway elections, the leaders of the EU claim that new measures to tackle disinformation and data manipulation are needed.

Article source: https://www.reuters.com/article/us-eu-summit-cyber/fearing-election-hacking-eu-leaders-to-ready-sanctions-idUSKCN1MS2N3

For other news please visit the Cybertide Blog

Cathay Pacific Airlines Has Data Breach Affecting 9.4 Million Passengers

Cathay Pacific Airways Ltd. and its subsidiary Hong Kong Dragon Airlines Ltd, confirmed that the data of about 9.4 million of their passengers had been accessed without authorization. The company said that the suspicious activity was discovered in March 2018 and an investigation in May 2018 confirmed that certain personal data was stolen.

Article source: https://www.reuters.com/article/us-cathay-pacific-cyber/cathay-pacific-flags-data-breach-affecting-9-4-million-passengers-idUSKCN1MY26L

For other news please visit the Cybertide Blog

Strategies for Dealing With Application Security Vulnerabilities

Although you can’t protect against everything, finding a practical approach to deal with vulnerabilities is important. Different organizations may have difference preferences and approaches on how to deal with vulnerabilities. The author suggests a novel approach, separating them into three different categories (Known, Latent, and Novel), claiming that it can help you stay ahead of attackers.

Article source: https://www.forbes.com/sites/forbestechcouncil/2018/10/05/strategies-for-dealing-with-the-three-types-of-application-security-vulnerabilities/#b954a7621e17

For other news please visit the Cybertide Blog

Visa is Launching Blockchain-Based Digital Identity System

In 2019, Visa is planning to provide a blockchain-based digital identity solution for financial institutions to securely process cross-border payments for businesses.
The B2B connect system uses a Hyperledger Fabric framework (developed with input from the Linux foundation and IBM), to power the identity platform for individual financial institution clients.

Article source: https://cointelegraph.com/news/visa-set-to-launch-blockchain-based-digital-identity-system-with-ibm-in-q1-2019

For other news please visit the Cybertide Blog

Employee Negligence Might Be Threatening Your Information Security

Employee negligence is proven to be one of the many information security risks that can affect companies today. Employee related mistakes such as remote workers, social engineering attacks, and shadow IT can all increase risk to an organization.

Article source: https://securityintelligence.com/is-employee-negligence-threatening-your-information-security/

For other news please visit the Cybertide Blog

Facebook Hack: What Happened and How it Affects You

Facebook reported that they had a massive security breach with at least 50 million of their users affected. The attackers exploited a vulnerability in Facebook’s code running the “View as” feature, by stealing users access tokens and potentially taking over their accounts.

Article source: https://www.pcworld.com/article/3310040/security/facebook-account-breach-faq.html

For other news please visit the Cybertide Blog

Current State of Cybersecurity Shows Now is The Time For Zero Trust

The healthcare industry has been one of the largest targets of attacks, followed by banking and financial services. These companies facing a security crisis today and need a more scalable approach that protects them from cyber attacks. This article explores the suggestion that a zero trust model could be the answer to some of these problems.

Article source: https://www.forbes.com/sites/louiscolumbus/2018/10/14/the-current-state-of-cybersecurity-shows-now-is-the-time-for-zero-trust/#3b9b2dd55f15

For other news please visit the Cybertide Blog

New U.S. Weapons Systems Have "Critical" Cybersecurity Problems

A review of government security audits conducted from 2012 to 2017, have found that agencies rushed in computerizing new weapons systems without prioritizing cybersecurity. The findings were released on Tuesday, October 9th, in a report from the Government Accountability Office.

Article source: https://www.washingtonpost.com/business/2018/10/10/nearly-all-new-us-weapons-systems-have-critical-cyber-security-problems-auditors-say/?noredirect=on&utm_term=.93bb92983e26

For other news please visit the Cybertide Blog

Lightning Network Integration Planned for Electrum Wallet

Electrum, one of the first bitcoin wallets, is planning to integrate the Lightning Network. This will provide its users with, cheaper transactions, instant payment confirmations, and the ability to scale up to a billion transactions a day.

Article source: https://www.bitcoinwednesday.com/speakers/thomas-voegtlin-founder-ceo-electrum

For other news please visit the Cybertide Blog

Senators Asking About Google+ Vulnerability Handling

Three senators are asking questions about the circumstances surrounding the vulnerability that lead to the disclosure of personal information for over 500,000 Google+ users. One of the biggest questions was why Google delayed disclosing that they had been hacked.

Article source: https://www.cnbc.com/2018/10/11/reuters-america-senators-asks-google-to-explain-delay-in-disclosing-vulnerability.html

For other news please visit the Cybertide Blog