Remove Definition Remove Education Remove Energy and Utilities Remove Events
article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

To prove ownership over the hijacked firms, they hire low-wage image editors online to help fabricate and/or modify a number of official documents tied to the business — including tax records and utility bills. “It’s still not good by any means, but it’s definitely better for consumers than it is for businesses.

article thumbnail

The Week in Cyber Security and Data Privacy: 4 – 10 December 2023

IT Governance

Only 3 definitely haven’t had data breached. Publicly disclosed data breaches and cyber attacks: full list This week, we’ve found 83,463,951 records known to be compromised, and 210 organisations suffering a newly disclosed incident. 138 of them are known to have had data exfiltrated or exposed. Source (New) Manufacturing Canada Yes 1.2

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. Kim Zetter’s book, Countdown to Zero Day, is perhaps the definitive book on the subject. You know, it isn't the blackout scenario.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

For example, in 2009, the Obama administration provided financial incentives to utilities in the United States. And again, smart meters were positioned squarely as making the environment more friendly by knowing how and when energy is being used by individual customers. Environmental effects caused by pollution.