Cybersecurity
SolarWinds’ Breach Disclosures Being Painstakingly Examined by U.S. SEC

Published
2 years agoon
By
Tara Ragone
We may earn a small commission when you click or purchase an item using a link on this website.
The U.S. Securities and Exchange Commission (SEC) is carrying out an intense investigation against Solarwinds to determine if its affiliated companies failed to acknowledge their susceptibility to the major hack that occurred months ago. The SEC is seeking information directly from Solarwinds’ clients through letters requesting admissions for non-disclosure of any impact the hack may have had on them.
Public companies and investment firms are at the forefront of this data gathering strategy in progress by the SEC, and they are being stressed about whether their current policies effectively protect customer information. Word has been spread that if the companies being pursued by the SEC respond, then they will not be subject to penalties for previously following procedures that were not effective. The SEC hopes to gain knowledge specifically regarding disclosures made to investing associates, unusual trading practices, and the breach of confidential data.
When share prices have the capability of being affected, companies are obligated to comply with U.S. securities laws, which require material information to be disclosed. In this particular Solarwinds hack that took place in December of 2020, share prices were dramatically affected. In addition to compromising various companies in the U.S. private sector, the breach struck at least nine federal agencies too.
The hacking actions were initially enabled due to malicious codes that were installed by criminals into software frequently used by government and public organizations. Numerous investigations stemmed from this attack and have been ongoing, including those by Solarwinds themselves, the U.S. Department of Justice, and the State Attorney’s General.
A Solarwinds spokesperson made statements asserting that their primary goal since the hack has been to collaborate with government officials and communicate with their customers to uncover the reasons behind the unfortunate occurrences as well as resolve events that came thereafter. The Russian KGB’s succeeding intelligence service, SVR, has been blamed for the Solarwinds hack by the U.S. and Britain.
Tara Ragone is a tech blog writer who focuses primarily in areas concerning cybersecurity and artificial intelligence. She holds a BA degree in legal studies and MA degree in homeland security, both awarded by Keiser University. Tara has been fulfilling her passion to learn and write about essential groundbreaking topics by researching, analyzing, and writing in academic and professional environments for over five years.

You may like
Has Your Information Been Breached in a Hack? Here’s What You Can Do
At Least 700 Million LinkedIn Accounts Breached and Exploited on the Dark Web
Iowa’s Wolfe Eye Clinic Reveals Mass Patient Information Leak after Ransomware Attack
SEC Arrives at Settlement with First American Financial Two Years After Breach of Data
Facebook, Google, And More Pressure SEC to Require Business Climate Reports
Electronic Arts Victimized by Malevolent Hackers Who Stole 780GB of Data
Cybersecurity
Disable Your Smart TV’s Ability to Watch You

Published
2 years agoon
July 29, 2021By
Tara Ragone
Smart TVs allow you to watch your favorite shows, stream content, and download your favorite apps. What you may not realize though, is that a smart tv’s constant connection to the internet makes it just as vulnerable to hacks as a computer or phone. Hackers might see or hear you.
To avoid becoming the victim of an intrusive smart tv hack, refer to the protection tips listed below:
- Cover the Camera – Find out where the camera on your tv is located and block it thoroughly with tape or another thick object. If you are having trouble locating the camera, go to a video app to see yourself and cover different areas until you are no longer visible.
- Check Settings – Secure yourself and your family by turning off microphone and camera permissions in your settings. There are specific privacy settings on numerous smart TVs that allow you to manage things such as data usage and ad generation.
- Be Aware – Know what the security and privacy policies are for your smart tv. Be sure you understand the data that the smart tv manufacturer or app designers are allowed to collect. A task as simple as reading a manual can provide insight regarding what type of unexpected personal information might be shared.
- Accept Updates – If your smart tv gives you the option to receive software updates, you should sign up for them to keep security features up to date.
- Change Password – Change generic passwords to a strong, personalized one that cannot be easily guessed or determined.
If the risk of your smart tv being hacked is not alarming enough, keep in mind that other devices connected to the same router may be targeted too. Reduce the threat of encountering a cyberattack on your smart tv by taking action now.
Consoles
Recovery Guidelines For a Hacked PSN Account

Published
2 years agoon
July 26, 2021By
Tara Ragone
You just received notice that your credit card has been charged for purchases made on your PlayStation account, only you never ordered anything. You know that you need to act fast but are unsure what to do. Guidelines are described below to help you recover your PlayStation Network (PSN) account after it has been compromised.
- Change Your Password: The first thing you always want to do after your account has been accessed by someone else without authorization is change your password. If you used your PSN password to protect other accounts they should be updated also.
- Use Two Step Verification: Adding a secondary verification feature will mean that you are required to enter a code in addition to your password when logging in. Even if a hacker has your password, he/she will not be able to get into your account once this is activated.
- Contact Sony: Contact Sony support quickly to alert them your account has been broken into by someone who you did not give permission to.
- Disable Cards: Reach out to your financial institutions to have all of your linked credit and debit cards disabled. Blocking access to your accounts will prevent hackers from illegally taking your money.
- Kick Hackers Out: Take advantage of Sony’s security option to kick out a hacker during the recovery process. See the below steps to do this:
- Once logged in, click ‘account settings’
- On the left side of the screen, click ‘security’
- At the bottom, click ‘sign out of all devices’
- Click ‘ok’ to confirm this step
While it seems unlikely that a hack into your gaming system account would lead to much loss, hackers are able to steal your personal information such as address and bank account numbers. It is imperative you take action right away to minimize a hacker’s success.

Virtual Private Networks (VPNs) offer a great sense of security for individuals who need to connect to a system remotely. By using a VPN, a person can access an encrypted internet gateway without using his/her own private connection.
VPNs are known to be a secure method for entering databases from any desired location in alternative to traveling to the actual location where a computer is, like an office setting. Despite the positives though, VPN users still face security threats such as a personal device being accessed by a cybercriminal somehow.
To combat the risks associated with VPN use, refer to the below tips:
- Enforce Policies. Most data systems operating in a defined location have policies in place so that users can protect information. Transferring these policies to remote VPN users will remind them to take caution when using their devices. Developing and enforcing penalties for users who fail to abide by the policies will lead to increased compliance.
- Implement Strong Authentication. Authentication methods will vary for VPNs depending on its purpose, but using the strongest one available is the safest.
- Add Encryption. Adding encryption to your VPN will strengthen its defense against cybercrimes.
- Set Access Limitations. Limiting access to only the individuals who have a legitimate need to see and use particular data will allow easier monitoring. This will also lower the chances of information being exploited through a personal device.
- Include Other Features. If features are available that allow tasks to be done without connecting to the VPN, they should be utilized to reduce unnecessary access.
- Require Additional Protection. Require that VPN users install extra layers of protection to their devices such as firewall and antivirus software.
VPN servers can easily become the target of a cyberattack. Follow the tips listed above to avoid the consequences of having a vulnerable server.