• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
AskCyber Home » News » News » Cyber Security News Update 04/06/2018

Cyber Security News Update 04/06/2018

2018-04-06 by Max

Three years ago the US government had its devices compromised due to the work of three Chinese hackers, and its still feeling the repercussions to this day. It would now seem that this is due to the negligence of workers and system personnel who failed to institute basic cyber security measures after the hack. A 16 month investigation by the Office of Inspector General (OIG) found that the Department of Interior’s (DoI) had failed to even scan their systems for malware after the attack had occurred, and that now malware has been detected inside the DoI. DoI technicians also failed to quarantine infected devices, allowing them to stay on networks and continue to compromise them for months after the attack. These same technicians also failed to investigate follow up attacks and suspicious devices. In light of this negligence, the OIG has had sensitive data from the DoI moved to secure servers in the Department of Defense (DoD). The OIG report showed that at least one computer was actively trying to communicate with Russian computers, but had been unable to do so due to automated security measures. These attempted communications triggered several warnings and alerts that were ignored by the DoI. The OIG found that personnel inside the DoI were also visiting porn wesbites located within Russia, and that these sites may have been compromised. As an attempt to elicit any response, the OIG instigated several malware and ransomware attacks against the DoI and it took over a month for someone to report that they had been locked out of their computer.
Source: Cybersecurity fiasco: Interior Department computers trying to talk to Russia, inspectors say

Facebook has continued to sink further in the public’s opinion as it becomes clearer just how little Facebook did to prevent the Cambridge Analytica scandal and just how many of their users were affected. As of now it would appear that nearly 2 Billion Facebook users have had their data compromised, which is nearly ALL of Facebook’s users. 77 million users had their data directly taken by Cambridge Analytica, but the rest of them had their data taken with less effort. Facebook has disabled a feature that allowed bots to scrape personal data from your profile. With a few keystrokes and mouse clicks, someone could build a bot that would go through social networks and find people’s personal data and then compile a list. This data was then packaged and sold on the Dark Web to be used in cyber and social engineering attacks. Those scraping Facebook profiles were able to provide the users name, hometown, photo, phone number, email and other data points that are used to verify someone.
Source: Facebook admits public data of its 2.2 billion users has been compromised

Filed Under: News

About Max

Max is a Data Privacy Coordinator at a major global law firm and a science fiction author residing in the Philadelphia area. He has been writing for https://www.askcybersecurity.com since early 2017.


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Google Says Advertisers Don’t Need to Track Individual Across the Web

Malaysia Airlines Reports Data Breach

Intelligence Manager – Emerging Threats

Email Scam Impersonates Your HR Department

FTC Warns of COVID Vaccine Scam Text Messages

IPVanish

IPVanish VPN

Cyber Security News

Google Says Advertisers Don’t Need to Track Individual Across the Web

… [Read More...] about Google Says Advertisers Don’t Need to Track Individual Across the Web

Malaysia Airlines Reports Data Breach

… [Read More...] about Malaysia Airlines Reports Data Breach

Email Scam Impersonates Your HR Department

… [Read More...] about Email Scam Impersonates Your HR Department

Microsoft Releases Open Source Tool to Root Out SolarWinds Malware

… [Read More...] about Microsoft Releases Open Source Tool to Root Out SolarWinds Malware

More Cyber Security News

Tags

amazon Android app Apple bitcoin China chrome CISA credit card Cyber Attack DHS Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware Romance Scam Russia smartphone tax scam TikTok tutorial VPN WhatsApp WiFi Windows

Government

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

Texas DOT Hit by Ransomware Attack

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2021 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version