Akamai Diversity
Home > Web Security > 5 Noteworthy Security Headlines

5 Noteworthy Security Headlines

Every morning I scan the news headlines for stories that may have an impact on Akamai customers and the wider security community. Today I direct you toward five items worth keeping an eye on.

Data Broker Giants Hacked by ID Theft Service
By Brian Krebs, Krebs on Security
An identity theft service that sells Social Security numbers, birth records, credit and background reports on millions of Americans has infiltrated computers at some of America's largest consumer and business data aggregators, according to a seven-month investigation by KrebsOnSecurity.

Recycled Yahoo Email Addresses Still Receiving Messages for Previous Owners -- Passwords Included
By Lee Munson, Sophos Naked Security blog
Yahoo announced in June 2013 that it was going to recycle inactive email addresses by giving them to other users who wanted them. Security experts and other critics raised concerns about Yahoo's plan at the time, and sure enough, some new owners of recycled accounts have received messages of a sensitive nature.

Researcher: Exploit kits revolutionize automated malware production
By Brandan Blevins, SearchSecurity
In the past, producing a unique malware sample was a time-consuming process that required knowledge of both programming and security systems. Now, a researcher has shown how automation has revolutionized malware production, turning it into a trivial pursuit for even novice attackers.

Social media, mobile phones top attack targets
By John P. Mello, Jr., CSOonline
Social media has become a top target of hackers and mobile devices are expanding that target, IBM reported on Tuesday in its X-Force 2013 Mid-Year Trend and Risk Report.

Banks Plan National Cyber-Attack Drill
By Tracy Kitten, Bankinfosecurity
More than 1,000 banks will test their incident response strategies by participating in a simulated cyber-attack exercise. SWACHA's Dennis Simmons says the drill, which is open to more participants, will help bolster defenses.

Leave a comment