• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » News » Cyber Security News Update 03/01/2019

Cyber Security News Update 03/01/2019

2019-03-01 by Max

A comprehensive study on the means and methods of malicious attacks found that 40% of all dangerous links are found on good or otherwise trusted websites. This makes sense as someone is less likely to click a link on a website that feels unsafe than they are to follow something on a website they “know” to be trustworthy. Following the trend of “comfort equals increased risk profile” trend, users who are at home or somewhere familiar are twice as likely to infect or compromise their devices as users who are not at home. This is understandable as your guard is down when you’re at home, that’s why it’s “home.” The study shows that security training is effective though as incidents fall by 70% or more within a year of users receiving the training. Additionally, devices running the newest version of their OS and kept up-to-date are 50% less likely to suffer an infection and are generally more secure. Enterprise devices should have a forced update feature that automatically installs software updates during downtime or after a certain period of time.
Source: Forty Percent of Malicious URLs Found on Good Domains

Iranian black hat hacker group, IRIDIUM, attacked the Australian government in seeming retaliation for Australia considering removing its support for Iran due to Australia’s ties to Israel. IRIDIUM is a threat group that goes after political targets and largely ignores other potential victims unless it aids them in infiltrating their chosen prey. IRIDIUM routinely goes after the Five Eyes countries (the United States, the United Kingdom, Australia, Canada, and New Zealand) and attempts to steal their data or otherwise impede their operations. IRIDIUM may have been involved with the large-scale cyber operation last year that stole data from over 300 universities, however, their active members shift frequently enough that it makes positively identifying them difficult due to a lack of telltale quirks and idiosyncrasies.
Source: Iridium cyberespionage gang behind Aussie parliament attacks

A database containing an international list of persons linked to high-profile crimes, politically compromised individuals and their associates, as well as government sanctions was found online and unguarded. This list not only had names but intimate details and included federal and state level evidence as well. It had been indexed by search engines and left unprotected, meaning that anyone with a working internet connection could find it. Dow Jones claims that all of its Watchlist data originates from publically available sources, so there was no breach of confidentiality and has since taken down the data. The Dow Jones Watchlist is used to assist in the vetting process for political positions. Despite the claimed public origins of the data, the easily searched and sorted format of the data is what made it a risk. The information could be used to create a profile of someone to steal more damaging information or begin an investigation on how to gain leverage of the compromised individual.
Source: Dow Jones database holding 2.4 million records of politically exposed persons

Filed Under: News

About Max

Max is a Data Privacy Coordinator at a major global law firm and a science fiction author residing in the Philadelphia area. He has been writing for https://www.askcybersecurity.com since early 2017.


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version