This week we saw activity that may concern voters in the upcoming presidential election with 3 different voter databases reported being compromised; Dropbox and were both breached in 2012 and decided to publish the number of users affected 4 years later; there is a new ransomware out that looks like a Windows update.

Highlighting the cyber-security news from the past week in a 120 sec. read. Starting now.


Multi-State Information Sharing and Analysis Center (MS-ISAC),reported that a county election office in Arizona was briefly taken offline in June due to an attempted attack.

why is this signficant?

  • The hackers were able to steal the login credentials after an alleged phishing email granted them access.  It is not reported how long the hackers were within the county election office's system, but credentials granted access to the voting records that could have been tampered with or deleted, which could have resulted in certain voters not being able to vote.
  • This type of attempted cyber attack raises concern due to this being the third reported incident, the first two are under investigation by the F.B.I. in Illinois affecting at least 200,000 voter records.
  • These reports are still under investigation, but may send the message that our votes may not be safe in this upcoming presidential election.  The FBI sent "flash alert" earlier this month to election officials nationwide to just be in-tuned. Cyber-security is still being overlooked and written off and not considered a high priority in the heat of presidential election season..

Read the full story on ComputerWorld


There were two different data breaches that occurred four years ago, while both companies are just now reporting the extent of both data breaches.

why is this signficant?

  • Dropbox was reported compromised in 2012 and has just confirmed the extent of the breach – a password database of 68 million users.
  •, a music site that was breached back in 2012, only now released that 43 million users were affected in the data breach
  • Both companies stored users' passwords, using unsalted hashing.  In the breach, it is reported that it only took 2 hours to hack and convert just over 96% of them to be visible passwords.  The concern lies in the fact that we are creatures of habit and tend to use the same password for multiple accounts.
  • Are companies going to start teaming together to understand the true extent of data breaches?  There also seems to be a further connection of it taking 4 years to report the true numbers affected in these breaches.

Read the full stories on Wired and CSO


Fantom Ransomware is hidden within a Windows update look-a-like.

why is this signficant?

  • A researcher discovered the Fantom Ransomware which was built using the open-source ransomware kit called EDA2.
  • Ransomware writers are creatively writing these ransomware to attract more clicks.  This "Fantom" ransomware, fools the innocent user in thinking they have a Microsoft update, only to be shocked with a locked computer running ransomware.
  • "The ransomware itself is called "CriticalUpdate01.exe," the file it extracts is called "WindowsUpdate.exe," and the screen that displays as it begins to encrypt your files looks very much like the modern blue screen that Windows 8, 8.1 and 10 users are familiar with."

Read the full story on on Tom's Guide 

Interested in ransomware prevention?  Get all the answers to ransomware here -