No, it wasn’t an employee with a skimmer. There’s an update to the Fuzzy’s Taco
Shop breach involving customers’ credit card information. Andrew McMillan reports:
KTXS spoke with Detective Gabriel
Thompson with the APD Fraud Division Thursday, and he revealed more details
about the two-month-long data breach that started in July and ended Sept. 1.
He said the information was not
taken by any employees at the Abilene location, and no physical devices were
installed to get the credit card information.
Thompson said online hackers were
able to spoof an email from an
employee who works with Fuzzy’s Taco Shop’s information technology and computer
system. The hackers pretended to be the
IT employee and sent an internal email to the manager of the Abilene Fuzzy’s.
The email instructed the manager
to download a program on a computer connected to the restaurant’s point of sale
systems. That program turned out to be
malware that infected the system and obtained credit card information from
purchases made at the restaurant, according to Thompson.
Read more on KTXS.
IT Governance! This
happens when you don’t have control of your hardware & software.
Diane Lee reports that Horry County Schools,
the third largest school district in South Carolina, was hit with ransomware in
February, and paid up:
A photo [Photo??? Bob] was
sent to Horry County Schools in February. It said if you don’t pay 22 bitcoin within “7
days” “it’s impossible to recover your files.”
Horry paid the $10,000 because
the cyber-criminals had breached 80% of its servers.
The district decided to publicly reveal what happened to
try to warn others, including admitting how a decision on their part had left
them vulnerable:
In it’s case, the hackers snuck in through an old server that was
never taken offline.
“We could have very easily prevented this attack for us by
saying, you know what, we’re going to keep that system available for access to
historical data, but we are not going to make it accessible over the public
internet,” said Hucks.
The county learned its lesson, it seems:
Horry County Schools now has a remote back-up offsite, [Business
Continuity 101 Bob] and
also several primary back-ups at each school to speed up recovery.
Good detection programs, and
backups aren’t cheap, but Brown says it’s far less costly to put more tax
dollars towards that than to pay for both the ransom and recovery after you get
hit.
Sounds right to me.
One tech administrator interviewed for the story said that
in the past six months alone, schools across the country have faced more than
8,500 ransomware attacks alone. But are
most districts able to prevent attacks? Probably
not:
Most of the software is getting
through our anti-virus and our anti-malware and is actually not being picked
up. We don’t get alerts typically from
that, we get alerts when we notice traffic leaving the computer and going
places that it shouldn’t go like Germany and Tiawan and Japan,” said Brown.
Read more on WSPA.
A voice worth listening to.
… Indeed, you can’t
examine the terms of service you interact with in any depth – it would take
more than 24 hours a day just to figure out what rights you’ve given away that
day. But as terrible as
notice-and-consent is, at least it pretends that people should have some say in
the destiny of the data that evanescences off of their lives as they move
through time, space, and information.
The next generation of networked devices are literally
incapable of participating in that fiction.
Because politicians know what consumers want? Because if you don’t buy computers that are
in compliance, you will have to pay for an electrical over-user license?
California nears adoption of energy-saving rules
for computers
California regulators moved a step closer on Friday to the
first mandatory U.S. energy efficiency standards for computers and monitors,
gadgets that account for 3 percent of home electric bills and 7 percent of
commercial power costs in the state.
Could make winning at any card game much easier.
Judging a book through its cover
MIT researchers and their colleagues are designing an
imaging system that can read closed books.
In the latest issue of Nature Communications, the
researchers describe a prototype of the system, which they tested on a stack of
papers, each with one letter printed on it. The system was able to correctly identify the
letters on the top nine sheets.
“The Metropolitan Museum in New York showed a lot of
interest in this, because they want to, for example, look into some antique
books that they don’t even want to touch,” says Barmak Heshmat, a research
scientist at the MIT Media Lab and corresponding author on the new paper.
No comments:
Post a Comment