Cyber Security News

What we’re talking about

database exposes 200 million
Cyber Security

Database Exposed 200 Million U.S. Citizens’ Data

Unsecured Database Exposed 200 Million on Cloud An unidentified party’s unsecured database exposed 200 million U.S. citizens’ sensitive data.  A CyberNews research team discovered the database which contained 800 gigabytes of unsecured data on a Google Cloud server.  The data included among other data, names, dates of birth, credit ratings, addresses, mortgage and tax records

Read More »
FBI Investigating HHS Cyberattack
Cyber Security

FBI Investigating HHS Cyberattack

The FBI Investigating HHS Cyberattack During Coronavirus Crisis The AP reported that Attorney General William Barr has announced that the FBI is investigating the HHS Cyberattack that took place on March 16, 2020 for the involvement of foreign governments.  The incident that was originally reported on Sunday March 16, 2020 by Bloomberg, involved a cyberattack

Read More »
Concerns for Business Cybersecurity
Cyber Security

Concerns for Business Cybersecurity Capabilities

Business Cybersecurity Report Card for 2019 There are growing concerns for business cybersecurity to meet the challenges of today’s hostile environment.  The international insurance underwriter Hiscox recently released its Hiscox Cyber Readiness Report 2019 and the news was not good.  The report showed that the number of cyber attacks has increased and that businesses of

Read More »
Understanding CMMC Requirements
Cyber Security

Understanding CMMC Requirements for DoD Suppliers

Understanding CMMC Requirements History Understanding CMMC Requirements is critical for businesses of all sizes in the defense industry.  A key to establishing effective Cybersecurity Maturity Model Certification (CMMC) is knowing what led to its development. Executive Order 13806 In 2017 President Donald Trump signed Executive Order 13806 Assessing and Strengthening the Manufacturing and Defense Industrial

Read More »
Cybersecurity Maturity Model Certification
Cyber Security

Cybersecurity Maturity Model Certification (CMMC)

What is Cybersecurity Maturity Model Certification? The Office of the Under Secretary of Defense for Acquisition & Sustainment has released the Cybersecurity Maturity Model Certification program.  The program will be made effective in new programs released by the Department of Defense (DoD) and will be a requirement for product and service providers.  This program has

Read More »
Infrastructure and Manufacturing Cyberattacks
Cyber Security

Infrastructure and Manufacturing Cyberattacks

Cyberattacks Strike Infrastructure and Manufacturing Infrastructure and manufacturing concerns pose tempting targets for cyberattacks.  When considering Cyber Security first thoughts usually go to computers and information technology, but industrial devices and processes can fall victims to attacks.  On February 18, 2020 the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) reported on a

Read More »
Economic Espionage by China
Cyber Security

Economic Espionage by China Threatens US Businesses

Economic Espionage by China Effects Businesses and Citizens of the U.S. Economic Espionage efforts by China continue to pose a serious threat to the United States.  On February 10, 2020 BBC News reported that the US Department of Justice has charged members of the People’s Republic of China’s military with the 2017 Equifax cyberattack that

Read More »
NSO Group Under Investigation
Cyber Security

NSO Group Under Investigation by the FBI

The FBI is Investigating NSO Group for Personal and Government Hacks The Israeli based NSO Group is under investigation concerning possible attacks on United States citizens and companies by the FBI.   Reuters reported on January 30, 2020 that the probe, which has been active since 2017, concerns the infection of smartphones.  NSO Group creates products

Read More »
apple icloud full encryption
Cyber Security

Apple iCloud Full Encryption News Should Raise Concerns

Apple Drops Plans for iCloud Full Encryption As reported by Reuters on January 22, 2020, Apple has dropped plans for full encryption of the iCloud for iPhone users.  This was in response to complaints by the FBI that such encryption would harm investigations.  Certainly the need for the availability of data by law enforcement agencies

Read More »
cybersecurity strategy
Cyber Security

Cybersecurity Strategy and Business Management

Having a Cybersecurity Strategy is Essential Having an effective cybersecurity strategy is a necessity in today’s business world.  News stories and alerts appear daily, informing us of yet another threat or data breach that has put at risk the valuable data and security of millions of people.  This endless pressure can lead to paralysis induced

Read More »
Mozilla Firefox Vulnerabilities
Cyber Security

Mozilla Firefox Vulnerabilities Show Need for Vigilance

High Profile Alerts Concerning Mozilla Firefox Vulnerabilities On January 8, 2020 the United States Department of Homeland Defense’s Cybersecurity and Infrastructure Security Agency (CISA) issued an alert concerning Mozilla Firefox vulnerabilities.  These vulnerabilities could allow external control of Mac and Windows computer operating systems by cyberattackers.  Mobile devices are not affected by this problem.  Mozilla

Read More »
Iranian Cybersecurity Threats
Cyber Security

Iranian Cybersecurity Threats Pose Increased Concern

The Truth About Iranian Cybersecurity Threats Given recent headlines, one might conclude that Iranian Cybersecurity threats were a new development.  In fact, Iran has been a player in the international cyber game since 2002 with the formation of the Ashiyane hacking forum to repress dissidents.  By 2007, government backed organizations had begun to develop sophisticated

Read More »
Cybersecurity
Cyber Security

Cybersecurity Threats

Cybersecurity Threats Cybersecurity threats continue to evolve.  In its 2018 Cyber Incident Breach Trends Report the Online Trust Alliance (OTA) listed some of the latest trends.  The report found that 95 percent of all breaches could have been easily prevented through simple and common-sense approaches to improving security.  The following are some of the more

Read More »
Export Compliance, ITAR, and EAR
Cyber Security

Export Compliance, ITAR, and EAR

Export Compliance, ITAR, and EAR Export Compliance can be a daunting task, but recent events illustrate the importance of vigilance.  On Tuesday, July 23, 2019 the Department of Justice indicted four Chinese nationals and a Chinese company for conspiracy to defraud the United States and evade sanctions.  The indictment alleges that the defendants sought to

Read More »