IT Security Stories to Watch: OPM Director Steps Down After Data Breach
What can managed service providers (MSPs) and their customers learn from these IT security news makers? Check out this week’s list of IT security stories to watch to find out:
1. OPM director steps down
Archuleta has stepped down as OPM’s director, and OPM Deputy Director Beth Cobert has taken over as the office’s acting director.
“I write to you this afternoon to share that earlier today, I offered and the President accepted my resignation as the Director of the U.S. Office of Personnel Management,” Archuleta wrote in an email to OPM staff, according to CNN. “Leading this agency and serving with all of you has been the highlight of my career.”
The resignation comes after OPM officials last week revealed that the office’s recent data breach affected 21.5 million people, TIME reported.
2. Army National Guard gets breached
Army National Guard said it recently suffered a personnel data breach.
Washington Examiner said the data breach included current and former soldiers’ names, Social Security numbers, dates of birth and home addresses.
“All current and former Army National Guard members since 2004 could be affected by this breach,” National Guard Bureau spokesperson Maj. Earl Brown said.
3. SSA identifies data breach
SSA last week said its credit and debit card processing systems were breached.
The company, which serves gift shops and eateries at zoos and cultural centers across the United States, told KrebsOnSecurity that customers who made credit or debit purchases between March 23 and June 25 could be affected.
“The violation occurred in the point-of-sale systems located in the gift shops of several of our clients,” SSA said. “The malware that caused the breach was identified and removed. All visitors should feel confident using credit or debit cards anywhere in these facilities.”
4. New malware affects Android users in 13 countries
Palo Alto Networks (PANW) researchers have discovered Gunpowder, Android malware that has affected users in at least 13 countries.
Firstpost noted that Gunpowder embeds malicious code inside popular Nintendo Entertainment System (NES) emulator games and steals victims’ browser history and bookmark information.
To date, Palo Alto Networks has observed 49 unique samples of the Gunpowder family.