Open Source CyberSecurity News – T-Mobile hackers claim to have data on millions

T-Mobile hackers claim to have data on millions

The seller of data on more than 100 million T-Mobile customers — stolen from company servers — told Motherboard that “full customer info” is for sale; the company has said little other than that it is investigating. The seller reportedly wants more than $250,000 for 30 million Social Security and driver’s license numbers.

Full Story:

Why do hackers hack?

Cyberattacks and malware infections may seem random, but many are thoroughly planned out with handpicked targets. By understanding the effect of an increasingly digital landscape on the mind, you can thwart cyber disasters and develop security measures designed to outsmart the human brain. Learn more.

Continue reading:

False positives from IT solutions are causing headaches

Amplitude Research polled 450 security decision-makers and found that almost half believe their organization is sufficiently protected against external threats. Another finding: 47% said their automated cybersecurity solutions create so many false positives that they ignore half of the solutions’ alerts.

Full Story:

It’s time to recognize passwords must be improved

Improving cybersecurity is no longer a matter of throwing tactics and tools at a vulnerability, writes Brian Gale of threat monitoring platform FYEO. Gale’s suggested first step: “Pick a password manager that all employees, regardless of technical know-how, can use.”

Full Story:

Watch for IT burnout as working from home persists

Now that it looks as though working from home will be extended at many companies, burnout among IT professionals will increase unless a “digital-first” mindset prevails, says Nicholas Avila of consulting firm Globant. “Most organizations were not ready for the pandemic, and deep down, most would prefer to go back to the pre-pandemic state so they can use their usual methods to build teams and ensure progress on projects,” Avila adds.

Full Story:

Looking for “unicorn” or “rock star” often doesn’t work

Leaders hiring for cybersecurity jobs “artificially limit their talent pool by overburdening their job search with narrowly defined qualifications,” says Zaira Pirzada of research firm Gartner. Tech vendors are often guilty of using terms such as “unicorn” and “rock star” to describe their needs, which creates biases, adds Ian McShane of security software provider Arctic Wolf.

Full Story:

More CyberSecurity News at

Support @QUE.COM

Founder, QUE.COM Internet Media. | Founder, a Shout for Joy! | MAJ.COM Management of Assets and Joint Ventures. More at KING.NET Ideas to Life.

Leave a Reply