article thumbnail

Lessons From the 2023 National Risk Register Report  

IT Security Guru

The 2023 Edition of the National Risk Register predicts that, in the next two years, there is a 5 to 25% chance that a devastating attack will target critical infrastructure and cause physical harm. A nationwide loss of power could create a ripple effect, causing disruption to internet telecommunications, water, sewage, fuel and gas supplies.

Risk 98
article thumbnail

Information risk and security for professional services

Notice Bored

When you acquire or provide professional services, how do you address the associated information risks? In theory, clients and providers should proactively identify, evaluate and address information risks relating to or arising from professional services in order to avoid, reduce or limit the damage arising from such incidents.

Risk 72
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Store manager admits SIM swapping his customers

Malwarebytes

A 42-year-old manager at an unnamed telecommunications company has admitted SIM swapping customers at his store. Armed with an email and password—which are easily bought online— and the 2FA code, an attacker could take over the victim’s online accounts. Contact the account provider if you find you no longer have access yourself.

article thumbnail

Sprint revealed that hackers compromised some customer accounts via Samsung site

Security Affairs

US telecommunications company Sprint revealed that hackers compromised an unknown number of customer accounts via the Samsung.com “add a line” website. “On June 22, Sprint was informed of unauthorized access to your Sprint account using your account credentials via the Samsung.com “add a line” website.”

article thumbnail

GUEST ESSAY: Preparing for the dire cybersecurity consequences of Russia’s invasion of Ukraine

The Last Watchdog

The Russian government, military, and intelligence service may wish to achieve some operational effect, for example, disrupting the power grid or interfering with telecommunications infrastructure, which may be part of a larger war plan. Educate your employees on threats and risks such as phishing and malware. Accounting for humans.

article thumbnail

FCC Enacts Rules Against SIM Swapping to Protect Mobile Phone Users

SecureWorld News

Federal Communications Commission (FCC) has adopted new rules aimed at enhancing security measures for cell phone accounts. SIM swapping involves the unauthorized transfer of a user's account to a SIM card controlled by malicious actors, achieved by convincing the victim's wireless carrier to make the change.

Mobile 93
article thumbnail

Hundreds of network operators’ credentials found circulating in Dark Web

Security Affairs

As an example of compromised accounts, Resecurity outlined exposed access credentials belonging to a major data center and one of the largest vendors providing international-scale network telephony connectivity to governmental and national telecom providers in Africa.