Welcome to our recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: When AI goes to the dark side; National Cyber Security Awareness Month; Amy Schumer is most dangerous celebrity on McAfee’s list; Yahoo’s data breach; BYOD & social media biggest internal security threats; wearable technology; 7 deadly Internet security sins; Dropbox hack; anatomy of a social media attack; and more.
These are some of the articles, reports, posts, etc. that caught our attention this week. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a monthly recap. Some have links that will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Others you need to go directly to our Twitter account to view. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.
- Daily Report: When Artificial Intelligence Goes to the Dark Side Criminals are beginning to take advantage of the kind of smart technology that imitates voices and helps people plot the fastest route home. com
- Tech Giants Team Up To Devise An Ethics Of Artificial Intelligence Amazon, Facebook, Google DeepMind, IBM, and Microsoft announced the Partnership on AI, which will research ways to use the tech responsibly. com
- White House urges you to use more stringent online security measures | Komando.com Risks of online security are real and keep growing, and now the White House is finally getting involved. Think of how much time you spend online and how many pass… com
- National Cyber Security Awareness Month Launches with a Call to Action for All Digital Citizens to… WASHINGTON, Sept. 29, 2016 /PRNewswire-USNewswire/ — Individuals and organizations around the world are marking… com
- Our lives in the age of Artificial Intelligence http://ow.ly/2Mf7304HgpI
- Artificial Intelligence Wrote a Pop Song, and It’s Better Than You Think Computers at a Sony lab composed the track after studying a large database of songs. com
- A data security check a day can keep the hackers at bay For a long time now, data security headlines have been reserved primarily for mass breaches of international enterprises as the IT industry struggles to move on f… information-age.com
- Amy Schumer is No. 1 on the 2016 McAfee Most Dangerous Celebrities List | Intel Newsroom Comedian and actress Amy Schumer ranked No. 1 on the McAfee Most Dangerous Celebrities™ 2016 study. intel.com
- What has Mr. Robot done for the security industry? Arguably an accurate depiction of the world of cybercriminals, is Mr. Robot sending the right message? com
- TeleSign Joins White House/National Cyber Security Alliance’s “Lock Down Your Login” Online Safety Campaign http://ow.ly/7j9j304GNGl
- 10 Questions: Raj De’s career has taken him from 9/11 Commission to White House to NSA http://ow.ly/lZI2304E07K
- Privacy and Security Loom Large In Policy Challenges At the “The Debate Between Security and Privacy Continues: Where Do We Draw the Line?” panel at ALM’s 2016 CyberSecure conference in New Yo… com
- How Yahoo’s Data Breach Could Overhaul Online Security A “full inquiry” into a massive data breach at Yahoo — which was revealed this week but took place in late 2014 — will decide the fate and revaluatio… wharton.upenn.edu
- 10 ways to secure a mobile workforce As much as you might want to implement all the latest best practices and lock down your company like Fort Knox, you need to align your policies to your company… com
- Key Legal Issues in Privacy/Data Security on Display in 6th Circuit Data Breach Class Action Decision http://ow.ly/CGME304BMBw
- BYOD and social media biggest internal security threats to organisations Fraudsters are mostly using social media for targeted attacks, a new report suggests. com
- Research insight: mobile security industry trends, competitive landscape, key regions http://ow.ly/B0Qg304zaXa
- Five Strategies For Creating a Culture of Data Security http://ow.ly/Vo3T304uCBI
- Your Biggest Cybersecurity Weakness Is Your Phone Another thing for CIOs to worry about. org
- Do no harm, don’t discriminate: official guidance issued on robot ethics Robot deception, addiction and possibility of AIs exceeding their remits noted as hazards that manufacturers should consider com
- Top 20 Artificial Intelligence Companies – Datamation http://ow.ly/EQHr304t19m
- Five social engineering scams employees still fall for You’ve trained them. You’ve deployed simulated phishing tests. You’ve reminded your employees countless times with posters and games and emails about avoiding p… com
- 3 Security Breaches That Freaked Out U.S. Companies It feels like a U.S. company gets hacked every month or so. Anyone who works in an IT or legal department is familiar with the bad news that follo… com
- Malware downloaded every 81 seconds, says new Check Point security report – TechRepublic A new report from Check Point claims that the average day in an enterprise organization is rife with malware and malicious applications. com
- Study: 61 percent of security pros don’t decrypt data, giving hackers an in http://ow.ly/Za4t304oSeD
- Self-Driving Cars Gain Powerful Ally: The Government New federal guidelines make it clear that, while the government will provide oversight, it wants to encourage the development of autonomous vehicles. com
- Top Story: Cyberattacks now cost $86K per incident | Komando.com How much money is in your savings account? No matter what the number is, you probably don’t want to spend that money recovering from a cyberattack. But new res… com
- Awareness training: How much is too much? The goal of security awareness training is to help employees recognize and avoid security risks. The key, experts say, is to make them skeptical but not operat… com
- Fast-Approaching National Cyber Security Awareness Month Reminds All Digital Citizens That Cybers… WASHINGTON, Sept.14, 2016 /PRNewswire-USNewswire/ — Oct. 1 marks the start of the 13th annual National Cyber… com
- S. Government Agencies Report Progress in Move to Digital Government, but Concerns about Security… RESTON, Va., Sept. 15, 2016 /PRNewswire/ — A new survey sponsored by Unisys Corporation (NYSE: UIS) found… prnewswire.com
- The Top 4 Data Security Best Practices Information is the lifeblood of today’s digital businesses. And according to research firm IDC, Canadian firms are projected to spend $2 billon com
- A Small Firm s Guide to Secure Client File Sharing http://ow.ly/p6u4304iLvy
- US Government Resolution Supports Digital Currency | PYMNTS.com The U.S. government is exploring a national policy for technology and digital currencies. com
- Is your security awareness training program working? The metrics to use to determine where to make improvements in security awareness training com
- Emerging technologies are poking holes in security Accelerated change challenges change management, security DevOps and emerging technologies that enable business innovation and opportunities demand fast, f… com
- Cybersecurity and the hospitality industry Commentary com
- 5 security questions mobile app developers should be asked How secure are your mobile apps? Ask any enterprise mobile developer and the answer will almost certainly be that security is a top priority. But s… com
- Gwinnett Tech Forum: The Evolution of Wearable Technology http://ow.ly/XLFJ3043CUy
- NACCSE Women in Cyber Technology Panel 2016 I attend various cyber-security related events throughout the year so I can keep myself updated on the latest in the industry as well as keep up with … com
- Social media can hold all the information hackers need British Science Festival hears how easy it is to retrieve important personal information com
- Once drones get artificial intelligence, they’ll rule the world Once drones come loaded with sophisticated AI and voice-recognition technology, humans won’t have to guide them. newsweek.com
- Alphabet, Amazon, Facebook, IBM, and Microsoft form AI ethics board The tech giants of Silicon Valley are working to take on the challenges of artificial intelligence before they can even arise. The group includes Alpha… co.uk
- 5 Surprising Cyber-security Risks on Social Media – TechCocktail Practically everybody uses social media these days. In fact, the average person is on social media nearly two hours a day. Security issues are una… co
- Social Media Poses Security Risks for Businesses Even though social media poses a security risk for businesses, the specific security threats are poorly understood, a Wombat Security report finds. com
- Email Insider: 4 Ways To Fight The Privacy Vs. Relevance Battle Marketers have long been wary of the “creep” factor when it comes to relevance. Now privacy concerns threaten to make relevance even more difficult to do w… com
- Seven Deadly Internet Security Sins http://ow.ly/HDnR303XiWu
- Why Social Media Sites Are The New Cyber Weapons Of Choice Facebook, LinkedIn, and Twitter can’t secure their own environments, let alone yours. It’s time to sharpen your security acumen. com
- Data Sabotage: The Serious Security Risk of Smart Cities Smart city technology is on the rise, bringing more efficient ways to administer city services. But the new threat of data sabotage also looms. com
- Eight Reasons Why You Need to Audit Your Data Security Plan http://ow.ly/De2Q303SxBA
- Edward Snowden’s Long, Strange Journey to Hollywood Oliver Stone wanted a hit — and the chance to put America’s most iconic dissident onscreen. The subject wanted veto power. The Russian lawyer w… com
- The Bonds that Bind: Cybersecurity Comes Together in Legal and Finance The financial industry has pulled legal into its cybersecurity orbit, but what does it mean for the future of legal services for financial institutions? com
- Social Media a Top Cybersecurity Challenge in the Workplace — Campus Technology http://ow.ly/paTN303Q7OJ
- SMART TECHNOLOGY TAKES FLIGHT – Robots, Growth, Intelligent Tech http://ow.ly/PiYV303Ny11
- 100 Best Practices in Big Data Secure Data Storage http://ow.ly/8POc303Nuov
- Dropbox hack leads to 68 million password hashes dumped online Dropbox is pushing password changes to users after millions of account details are released online. sophos.com
- The Four Mobile Security Threats You Need to Know About – McAfee http://ow.ly/p1Yx303Lm02
- What does the WhatsApp privacy policy update signify? – CIO Symmetry http://ow.ly/D4TA303L6z7
- Social media, the gateway for malware Social media sites, largely outside of enterprise control, are rich with personal information for malicious actors com
- Deception technology grows and evolves Deception technologies such as honeypots are becoming increasingly popular with enterprises as the products get more flexible and the tools allow security… com
- What’s your attack surface? Take responsibility for staying safe online In our day-to-day lives, the biggest threat to our online security is actually ourselves. net.au
- The Most Important Elements of Application and Data Security – DZone Performance 1) Focus on the fundamentals; 2) identify best practices, frameworks, and architectures; 3) embed security in the SDLC; 4) be data centric; and, 5) test and monitor cont… com
- Considering Privacy in the Age of the Camera http://ow.ly/Dbd1303GtIC
- How artificial intelligence is aiding the fight against cybercrime http://ow.ly/cI1K303FOYJ
- This Social Engineering Trick Foiled My Online Security A simple social engineering hack can easily allow attackers to steal your phone number and wreak havoc on your life. Find out how it happens and… com
- When it comes to protecting personal data, security gurus make their own rules http://ow.ly/y2hl303ERf7
- Take the FBI’s Safe Online Surfing Internet Challenge (Learn More) – American Security Today What do more than 870,000 students across the nation have in common? Since 2012, they have all completed the FBI’s Safe Online Surfing (SOS) Internet Challenge…. com
- 9 Ways to Secure Your Smartphone and Protect Your Mobile Privacy We’ve put together all the ways to maintain your smartphone privacy and keep your phone secured. com
- Mozilla launches free website security scanning service Mozilla has built an online scanner that can check if websites have the best security settings in place. com
- Anatomy Of A Social Media Attack Finding and addressing Twitter and Facebook threats requires a thorough understanding of how they’re accomplished. com
- Don’t let social media open the door for thieves Guard against sharing personal information online com
- The future of driverless cars and data security | Information Age The future of driverless cars and data security The technology is in place for driverless cars, but data security must be improved. Regulators are weighing new laws, and insurers and other stakeholders are actively… information-age.com
- Why security is a transversal issue for video games development Santiago Sassone, a senior corporate communications specialist, on why security is a transversal issue for video games development. com
- Apple’s Black Hat Security Talk Can Now Be Viewed Online The video provides viewers with an insight into the security of Apple’s iOS. com
- Data security: Will new consent and opt-out plans protect our personal health information? The recent review of data security, consent and opt-outs lead to the demise of care.data, but it may not yet herald a new era of transparency over what is happening with… com
- EU to crack down on online services such as WhatsApp over privacy Europe will publish draft law to ensure that online messaging services have privacy rules like those for texts and calls com
- Security Risks: Smartphone Apps and Sensitive Data http://ow.ly/LxtW303hZkJ
- 6 shocking gaps in your data security strategy Find out where CISOs are shifting their investments to close 6 of the most challenging security gaps in today’s enterprise security strategies. com
- Protect Your Mobile Security at the Rio Games http://ow.ly/kc0z3039Hv3
- Does entertainment trump security in connected cars? Security as an afterthought is still the cause of most common vulnerabilities in connected cars. com
- Online gamers risking security attacks Fans of games like Pokémon Go may be letting their guard down and letting hackers in co.uk
- Five tips for raising security awareness To develop a culture of security in your business, all employees must play a role in practicing and developing security awareness. samsung.com
- Data, Privacy & Security Practice Report – August 8, 2016 http://ow.ly/ckX93036lzb
- 10 Privacy and Data Security mistakes that a budding startup must avoid – KnowStartup The legal and business implications of poorly managed privacy and data security practices are too important to ignore. com
- FTC Commissioner Looking for Hackers’ Help With Consumer Privacy At DefCon, FTC Commissioner Terrell McSweeny makes a plea for hacker help in areas the commission is lacking. com
- Over 75 Cybersecurity Tips in This Free eBook! Are you worried about cybercrime against your business? The increasing reliance on technology can certainly make running a business easier. But… com
- Generational differences in security, privacy attitudes How does being a Millennial, a Boomer or a Gen X-er impact your attitude toward security and safety? Ted Harrington from Independent Security Evaluators chat… com
- The history of social networking Social networking didn’t start with Facebook. We examine the history of social networking, from BBSes and Friendster to Diaspora and beyond. com
- Rio 2016: Social Media Scams And 4,500 Fake Apps Target Olympics http://ow.ly/X5ud302ZaKT
- Social media security: Avoiding the phishing threats from Facebook, Twitter and LinkedIn – Computer… Analysis: Is LinkedIn a danger to your business? com
- 5 Keys to Protecting Your Customers’ Data If we’re going to be making payments online, online security needs to step it up… com
- Wearable Technology Raises Concerns Regarding IP, Data Privacy and Data Security When fashion fuses with high tech, we see our friends show up with trendy wearables, such as smart watches, fitness bands, and even high-tech, designer purses. Bu… com
- 5 Social Media Security Recommendations for Your Startup Social media provides plenty of features for business development. Facebook, Twitter, and other networks are not just valuable but crucial t… co
- Big data vs. privacy: the big balancing act | Information Age http://ow.ly/cBSZ302Xj3h
- What’s in a security score? In May, FICO upped its own scoring game. It acquired cybersecurity firm QuadMetrics to create its own brand of enterprise security scores for enterprises. The new s… com
- What You Need to Know about the Data Security Act of 2015 http://ow.ly/88Ab302UZvu
- No Harm? No Matter. FTC Broadens Data Security Liability http://ow.ly/lhu0302UZpr
- Can Data Security Keep Up With Fraud, Bots and Hackers? http://ow.ly/RCzQ302Syil
- The seven fundamentals of mobile security models Samsung and Booz Allen Hamilton have partnered to create a mobile security risk assessment, covering all the fundamentals of security models. samsung.com
- Mobile Security News Roundup: Top Stories From July It has been an eventful July for mobile security, with news regarding “Pokemon Go,” smartwatches, IBM MaaS360’s ISO 27001 certification and more. com
- Tips on securing your social media account In today’s world, we are increasingly living digital lives, where we interact and engage with our friends and family online. Social media has become central to our lives, … it-online.co.za
- Snapchat, Social media and the internet’s security illusion Computers and the internet in general, give a false sense of security. But when you press the delete button,does the item simply go out of existence? ng
- Data Security: The Top 10 Skills You Need on Your Team How secure is your network? Do you have IT security covered from every angle? Many companies may not think they’re a target, but breaches and… com
- Security Think Tank: EU data security principles apply, regardless … What are the pros and cons of Brexit for information security professionals and data protection? com
- Hacker Explains Why OurMine Took Over ‘Pokémon GO’ Creator’s Social Media Accounts FORBES talked to a hacker claiming to be from the infamous OurMine group regarding the decision to attack the accounts of Niantic Labs CEO John Hanke. com
- 7 security lessons learned from Game of Thrones With new hacking techniques, malware, viruses and threats being created faster than Melisandre’s demon babies, the web is indeed dark and full of terrors. Here … com
- Pokémon Go: A Security Threat to Your Business? It seems like you can’t go anywhere these days without bumping into a gaggle of Pokémon GO addicts. Since its release at the start of July, the … com
- New EU Data Protections Require Fast Action http://ow.ly/mq4s302Nxd9
- What security measures are in place around voter data? This week, political fallout continued after hackers accessed an analytics program used by the Clinton campaign, along with emails and voicemail… org