Between Flash and PDF Reader alone, Adobe is ubiquitous on today’s desktop. Have you ever registered for an Adobe product? If you have, you should seriously consider changing your password. If you are like most people, who use similar passwords and usernames across their personal account, you might consider changing all of your passwords.On October 3rd, Adobe announced that they were the victims of one of the most significant data breaches in history. Personal data for nearly 2.9 million of their customers had been stolen, including credit card data. That alone put it in the hall of fame of breaches.But it gets worse.
Yesterday, Adobe announced that an additional 35 million customer data records were included in the breach. They hastened to add that these records do not include credit card data, but personal information that includes user names and passwords can be a goldmine to hackers.
The passwords were encrypted, but that is usually not enough to stop determined hackers. Adobe reset all current passwords and published a security alert with help for effected customers. They wisely advise customer’s to update their passwords to one that they have not used before and to beware of phishing email scams that pretend to be a reset message from Adobe. Such scams trick victims into revealing their user names and passwords by taking them to a fake web site that looks like the real company and its login or password reset page.
It is very important to understand this is not just about access to your account with Adobe. Increasingly, hackers are taking a highly targeted approach to their attacks. Borrowing from the techniques of “Advanced Persistent Threats” pioneered by nation states, hackers will target very specific individuals to gain access to their organization’s network or to dupe into a financial fraud.
The information stolen from Adobe can be a gold mine for APT attacks. Many, if not most people reuse the same user names and passwords, often with a pattern for varying passwords when they require a change. The bad guys may just be able to derive you online bank login based on your Adobe account credentials.
The Adobe security alert leaves off another aspect of the breach that is also quite troubling. Hackers, presumably part of the same operation, also stole the source code for several of Adobe’s major products, including PDF viewer and Photoshop.
Why would hackers want source code and why should I care? I’m glad you asked me that!
Hackers can use the source code for two purposes. With some products, most prominently Adobe Flash, hackers look for vulnerabilities in the software that they can exploit to spread Trojan viruses Trojans and take over computer. They can also use the source code to spread faux versions of the software that are in fact.
One final thought on this mess.
Companies like Adobe work hard to protect their networks and their data, so breaches are relatively rate. However, when they occur they are bad.
Consider this: In a paper based world it would take a large store room filled with dozens of filing cabinets. It would be tough to sneak out the door with all of that data. You would need a truck to move it all.
However, the stolen file was a “mere” 3.8GB, easily copied using a USB thumb drive! This means that no matter how hard organizations work to shut the door on hackers, the hackers will work even harder. If they can pry that door open, they drive a truck through it!
Airgain unveils extended portfolio of 5G OMNIMAX Dipole series antennas for M2M and IoT apps
Airgain announced the release of its OMNIMAX Next Dipole antennas, the latest addition to Airgain’s 5G product portfolio designed to deliver ultra-wideband connectivity for 5G NR sub-6GHz IoT and M2M applications.
The OMNIMAX Next Dipole series includes 5G NR sub-6GHz products for low profile and shock resistant outdoor applications, including “salt shaker” style antennas, indoor dipole “paddle” antennas, and outdoor “candlestick” dipole antennas.
Each product is designed to blend into the environment, with flexible mounting options while providing ultra-wideband connectivity for virtually any indoor or outdoor cellular module, modem, or gateway. The 5G ready OMNIMAX Next Dipole series provides future-proof performance, with backward compatibility from 5G to 4G and 3G global frequency bands.
“Supporting sub-6GHz 5G, particularly the lower bands approaching 600MHz, is challenging for the form factors of these products,” said Kevin Thill, Airgain’s Senior Vice President of Engineering.
“These antennas achieve excellent broadband performance without compromising the form factor, while outperforming competing solutions that we have seen in the market today. These antennas feature a unique and patent pending Coplanar Waveguide feed, which is key to enabling the ultra-wideband performance in the given form factors.
“We are excited to offer the expansion of our product portfolio of 5G ready antennas designed to accommodate wider bandwidth requirements demanded by 5G. The OMNIMAX Next Dipole series provides a cost-effective solution while delivering dependable quality.”
Building on Airgain’s antenna design expertise of CENTURION Next, the industry’s first 9-in-1 5G and Wi-Fi 6 fleet antenna, the OMNIMAX Next Dipole series includes 617 MHz to 6 GHz wideband cellular 5G support. OMNIMAX Indoor Dipole Next, OMNIMAX Outdoor Dipole Next, and M2M SN Next are available through our trusted channel partners or direct at 1-855-AIRGAIN.
You Are The Weakest Link
Tom Finan on human imperfection and cyber security culture
A craftsman never blames their tools. It is not the systems that ultimately fail cyber security professionals- it’s the people. Insider threats do abound but more often than malfeasance, misfeasance is the key to a breach. It wasn’t the firewall that failed Capitol One, it was a misconfiguration. Tom Finan dives in on culure vs. strategy quoting both Peter Drucker and…Barbara Streisand.
Covid 19 has changed 2020 in unprecedented ways in how we work, live our lives, and measure Cyber Risk. Listen to Episode #141 of Task Force 7 Radio as the Cyber Growth Leader from Willis Towers Watson, Tom Finan and Co-Host Andy Bonillo dive into how the “Cyber Security Superheroes” are working together to manage the human element during the pandemic. As claims data shows, effective Cyber Risk prevention and mitigation is largely a people problem. In response, companies need to assess and analyze the elements of their cultures that shape both positive and negative cyber attitudes and behaviors that makes the human element one of the largest risks to a company.
Axio360 platform to provide holistic view and identify financial impact of risk for Archer’s clients
Axio announced a strategic partnership with cybersecurity consulting firm Archer. This partnership will merge Archer’s expertise in critical infrastructure protection with the Axio360 platform and allow clients to measure cyber risk exposure in financial terms and manage their cybersecurity program from a holistic point of view.
The Axio360 platform will assist Archer’s clients in identifying cyber risks across business units and threat vectors that may not have previously been considered. The platform estimates all-in costs of exposure and evaluates how specific controls and mitigations will reduce risk.
“The Axio platform was built to fundamentally redefine how organizations solve cybersecurity problems. Our intention is to enable business-centric decision-making by putting the risk in financial terms,” said Brendan T. Fitzpatrick, Senior Vice President of Channels & Partnerships for Axio.
“Our operating system aligns all key constituents and delivers clarity in real-time. This partnership with Archer allows our software to make critical infrastructure safer and more secure.”
“This partnership allows our asset owners to receive tailored recommendations from Axio and our dedicated team. For the first time, our clients will be able to measure their cybersecurity program and benchmark it across their industry peers,” stated Patrick C. Miller, Managing Partner for Archer.
“This collaboration will help the overall assessment and understanding of cybersecurity risk for critical infrastructure.”
Axio360’s methodology and software empowers organizations to continuously answer the four most critical questions for cyber risk:
- What’s my exposure in financial terms?
- How should I manage my cyber program?
- Do I have the financial ability to recover?
- Where should I invest?
Bitcoin’s Halving May Not Pump Price Like Last Time – Here’s Why It Doesn’t Matter
What Are “Crypto/Digital Assets” and How Can They Be Taxed?
The Most Common Types Of Cryptocurrency Scams in 2020
What time does the Steam Summer Sale 2020 end?
$100,000 USDC Blacklisted, Highlighting Importance of Decentralized Stablecoins
Australian comedian Jim Jefferies bought one bitcoin for $10,000 just for fun.
Record Revenue for Blockchain Gaming Company During Pandemic
Chainlink (LINK) Rally Stalls At $6.6: Here’s Why Uptrend Is Intact
BitFlyer Partners With Brave to Develop New Crypto Wallet
Twitch streamer Ohlana has died by suicide at age 26
Bitcoin Bearish Fractal Casts Doubt on Breakout Possibilities
Why Top Analyst Predicts an Altcoin Rally on Key Ethereum Breakout
FYI: You do all know that America’s tech giants, even Google, supply IT to the US military, right?
Ninjas in Pyjamas cuts captain SoNNeikO after string of bad results
Jim Jefferies Owns Four Times as Much Bitcoin as Elon Musk
Rod ‘Slasher’ Breslau on COVID-19 and esports
ShackStream: F1 2020 first look
Sergey Nazarov: Smart Contract Adoption by Enterprises About to Take Off
Bitcoin Daily Chart Indicates Crucial Bullish Breakout Towards $10,000
Former Facebook Counsel Joins Coinbase as Chief Legal Officer
Cardano Price Prediction: ADA/USD Journey To $0.2 Begins
Following Bitcoin’s Hash Rate, Network Difficulty Is About to Set a New High
Dabuz takes over SmashTierList following Nairo allegations
World of Warcraft: Shadowlands Collector’s Edition announced
Chevrolet’s refreshed 2021 Corvette has wireless CarPlay, Android Auto
Indonesia Stock Market Has A Green Light For Thursday
Standard Uranium Announces CEO Performance Incentive Bonus
How a Fragile Monetary System Could Influence Bitcoin in the Coming Months
Bitcoin Price Analysis: BTC/USD Begins To Make The Vital Steps To $10,000
Australia Home Loans Plummet 10.2% On Month In May
Automotive1 week ago
Variables Complicate Safety-Critical Device Verification
Business Insider5 days ago
A 17-year-old entrepreneur made nearly $500,000 reselling sneakers during a quarantine. Here’s a look inside his pandemic-proof business model.
Gaming6 days ago
Fortnite Floating Rings Locations: Where To Collect Rings At Lazy Lake
Blockchain1 week ago
Bitcoin Solves This: $2.8 Billion Worth of Gold Counterfeited by Chinese Company from Wuhan
Blockchain1 week ago
ABA Global Signed Strategic Partnership with GCOX
AI1 week ago
This Tiny House Is 3D Printed, Floats, and Will Last Over 100 Years
Gaming1 week ago
Rat King – The Last of Us Part 2
Gaming1 week ago
Nier Creator’s New Game SinoAlice Is Out Now