{"id":49,"date":"2018-12-04T02:56:47","date_gmt":"2018-12-04T02:56:47","guid":{"rendered":"http:\/\/timproffitt.com\/?page_id=49"},"modified":"2022-05-05T13:38:41","modified_gmt":"2022-05-05T19:38:41","slug":"noteworthy-news","status":"publish","type":"page","link":"http:\/\/timproffitt.com\/?page_id=49","title":{"rendered":"Noteworthy News"},"content":{"rendered":"\n<p><\/p>\n\n\n<h3>Toggle Magazine Article<\/h3>\n<p><blockquote class=\"wp-embedded-content\" data-secret=\"RHXkicAP9H\"><a href=\"https:\/\/www.togglemag.com\/case-studies\/dr-tim-proffitt-insperity\/\">Dr. Tim Proffitt \u2013 Insperity<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Dr. Tim Proffitt \u2013 Insperity&#8221; &#8212; ToggleMAG\" src=\"https:\/\/www.togglemag.com\/case-studies\/dr-tim-proffitt-insperity\/embed\/#?secret=00QMtLzoHz#?secret=RHXkicAP9H\" data-secret=\"RHXkicAP9H\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>Lengths organizations will go to in order to break into a iPhone<\/h3>\n<p>This article goes into some interesting descriptions of a lab in NY that is tasked with breaking into locked\/encrypted iPhones.<\/p>\n<p>https:\/\/www.fastcompany.com\/90453437\/inside-the-10-million-cyber-lab-trying-to-break-apples-iphone<\/p>\n<h3>Is your TV spying on\u00a0 you?<\/h3>\n<p>It turns out that the FBI is advising TV owners to disable cameras and look for privacy settings on any smart TV.<\/p>\n<p>Using technology called automatic content recognition (ACR), TVs watch what you&#8217;re watching &#8212; no matter whether it&#8217;s from streaming, cable, satellite, DVD, whatever. It then sends this data every second to the TV manufacturer, where it can identify what you&#8217;re watching, where you&#8217;re watching, and who you are.\u00a0<\/p>\n<p>https:\/\/www.zdnet.com\/article\/fbi-warns-about-snoopy-smart-tvs-spying-on-you\/<\/p>\n<h3>New Storage Medium has Potential for Archives<\/h3>\n<p>A piece of silica glass measuring 7.5 cm x 7.5 cm x 2 mm was able to hold the entire Superman (1978) movie in the shape of three-dimensional nanoscale gratings and deformations as part of\u00a0<a href=\"https:\/\/news.microsoft.com\/innovation-stories\/ignite-project-silica-superman\/\">Project Silica led by Microsoft Research<\/a>, resulting in 75.6 GB of data inside the durable quartz glass that&#8217;s no bigger than a drink coaster.<\/p>\n<p>https:\/\/www.techspot.com\/news\/82624-microsoft-successfully-archives-warner-bros-uperman-movie-piece.html<\/p>\n<p>\u00a0<\/p>\n<h3>Johannesburg City Held for Ransom<\/h3>\n<p>Yet another city hit with crippling randsomware left with a DdoS situation.<\/p>\n<p>Read here. https:\/\/www.infosecurity-magazine.com\/news\/johannesburg-held-to-ransom\/<\/p>\n<h3>CEO \u2018Deep Fake\u2019 Swindles Company Out of $243K<\/h3>\n<p>In the first known case of successful financial scamming via audio deep fakes, cybercrooks were able to create a near-perfect impersonation of a chief executive\u2019s voice \u2013 and then used the audio to fool his company into transferring $243,000 to their bank account.<\/p>\n<p>This makes a voice call to verify a request very interesting and risky. A stronger authentication method is going to be needed if this tred continues.<\/p>\n<p>You can read the story here https:\/\/threatpost.com\/deep-fake-of-ceos-voice-swindles-company-out-of-243k\/147982\/<\/p>\n<h3>Ohio School is shuttered because of a malware outbreak<\/h3>\n<p>An Ohio school district was forced to send students and some of its staff home on Monday after a malware infection caused major issues to its IT infrastructure. The malware infection was not a ransomware attack, but a banking trojan. The malware brought down the school district&#8217;s IT systems and cause enough of a disruption to close the school.<\/p>\n<p>https:\/\/www.zdnet.com\/article\/ohio-school-sends-students-home-because-of-trickbot-malware-infection\/<\/p>\n<h3>Denial of Service caused Power grid outage<\/h3>\n<p>A recent cyber disruption to the U.S. grid involved a &#8220;denial of service condition&#8221; at a Western utility, according to a Department of Energy official.<\/p>\n<p>On March 5, an unidentified power company fell victim to a &#8220;cyber event&#8221; that interfered with operations but stopped short of causing blackouts, according to a DOE filing this week. A DOE official confirmed yesterday that the event &#8220;did not impact generation, the reliability of the grid or cause any customer outages.&#8221; But the denial-of-service attack was significant enough for the utility to file an electric disturbance report with DOE \u2014 the same forms reserved for major interruptions like storms, physical attacks or fuel shortages<\/p>\n<p>https:\/\/www.eenews.net\/stories\/1060254751<\/p>\n<h3>The city of Greenville SC shut down due to malware attack<\/h3>\n<p style=\"font-weight: 400;\">The source of the ransomware and the infection is being conjectured upon by the help of the city staff and IT professionals. \u00a0The IT team is working on getting the operation back online. The only servers that were separate and went unaffected were of the Greenville Utilities Commission and that of the emergency for and police department.<\/p>\n<p>http:\/\/www.ehackingnews.com\/2019\/04\/usa-leading-servers-of-greenville-were.html<\/p>\n<h3>Aluminum Manufacturer Grinds to a Halt Due to Malware Outbreak<\/h3>\n<p>Norwegian metals and energy giant one of the world\u2019s biggest aluminum producers have been hit by a ransomware attack that has impacted operations, forcing the company to resort to manual processes. This incident has caused a global price increase in the product.\u00a0 You can read about it here:\u00a0<\/p>\n<p>https:\/\/www.securityweek.com\/aluminum-giant-norsk-hydro-hit-ransomware<\/p>\n<h3>The next time you want to charge your USB-C device at an airport or public kiosk, you might want to reconsider.<\/h3>\n<p>Current Operating systems don&#8217;t sufficiently protect memory, making it possible for a malicious act, according to new research. The weaknesses, collectively called\u00a0Thunderclap, highlight a new class of threats. This research points out in contrast to regular USB ports, USB-C ports have higher privileges and low-level access to a device. You can read about the research here.<\/p>\n<p>https:\/\/www.inforisktoday.com\/dongle-danger-operating-systems-dont-defend-memory-a-12057<\/p>\n<h3>McAfee Claims 25 million Smart Speakers are at risk<\/h3>\n<p style=\"font-weight: 400;\">According to a cybersecurity report of McAfee, over 25 million voice assistants which are connected\u00a0 IoT(internet of things ) devices at home globally are at huge risk of hacking.<\/p>\n<p style=\"font-weight: 400;\">Raj Samani, McAfee Fellow and Chief Scientist at McAfee said \u201c Most IoT devices are being compromised by exploiting rudimentary vulnerabilities, such as easily guessable passwords and insecure default settings\u201d<\/p>\n<p>http:\/\/www.ehackingnews.com\/2019\/02\/around-25-million-home-voice-assistants.html<\/p>\n<h3>Deep Fake Videos Should Scare you<\/h3>\n<p>The technology, which relies on machine learning and artificial intelligence, was once largely relegated\u00a0to\u00a0researchers\u00a0at prestigious universities. But over the past few years, a growing online community has democratized the practice, bringing powerful and easy-to-use tools to the masses. See this article and marvel at the Jennifer Buscemi!<\/p>\n<p><blockquote class=\"wp-embedded-content\" data-secret=\"CJHibya65H\"><a href=\"https:\/\/www.dailydot.com\/debug\/jennifer-buscemi-deepfake\/\">Jennifer Buscemi is the deepfake that should seriously frighten you<\/a><\/blockquote><iframe loading=\"lazy\" title=\"&#8220;Jennifer Buscemi is the deepfake that should seriously frighten you&#8221; &#8212; The Daily Dot\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/www.dailydot.com\/debug\/jennifer-buscemi-deepfake\/embed\/#?secret=CJHibya65H\" data-secret=\"CJHibya65H\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>Customs officers searching more travelers\u2019 devices<\/h3>\n<p>U.S. Customs and Border Protection officers are searching the electronic devices of travelers more often and did not always follow proper protocol, a new watchdog report has found.\u00a0Officers are allowed under law to look through devices of travelers who are referred for a secondary inspection.<\/p>\n<p>https:\/\/apnews.com\/54497b1d5f5541efb96dc25d11ee66a3<\/p>\n<h3>The State of Phishing Defense 2018: What Healthcare Needs to Know<\/h3>\n<p>Phishing is still the #1 entry point for cyber-attacks, your defenses need to focus on the most pressing threats: active phishing campaigns that are probing your healthcare organization. This report breaks down the Top 10 threats, with metrics showing how well users respond to each.<\/p>\n<p>https:\/\/www.databreachtoday.com\/whitepapers\/state-phishing-defense-2018-what-healthcare-needs-to-know-w-4743<\/p>","protected":false},"excerpt":{"rendered":"<p>Toggle Magazine Article Dr. Tim Proffitt \u2013 Insperity Lengths organizations will go to in order to break into a iPhone&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-49","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/timproffitt.com\/index.php?rest_route=\/wp\/v2\/pages\/49","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/timproffitt.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/timproffitt.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/timproffitt.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/timproffitt.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=49"}],"version-history":[{"count":19,"href":"http:\/\/timproffitt.com\/index.php?rest_route=\/wp\/v2\/pages\/49\/revisions"}],"predecessor-version":[{"id":224,"href":"http:\/\/timproffitt.com\/index.php?rest_route=\/wp\/v2\/pages\/49\/revisions\/224"}],"wp:attachment":[{"href":"http:\/\/timproffitt.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=49"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}