The following assignment focuses on examples of cybersecurity issues found in the news. The assignment asks us to locate and evaluate two articles that showcase two different types of cyberattacks. From it, I've learned about how frequently cyberattacks occur in different parts of the country and how both individuals and organizations work to respond to them.
In an article published on April 17th, 2024 through the KTLA5 news network, digital news producer Will Conybeare reports on a recent spoofing scam happening in Southern California. The attack involved a man spoofing his phone number to make his call look as though it was coming from the local police department. After the call was answered, the man falsely presented himself as a member of the police force and attempted to scare the recipient into giving out personal information. The article comes from a local news source and sites a public police report available here, making it a credible source.
To protect yourself against this particular scam, the article recommends contacting the local police department at the number provided by the author. Broadly speaking, spoofing attacks can be circumvented by hanging up the phone, identifying the service that the spoofer presented themselves as, and contacting the service directly through their official support channels. From there, the spoof can be reported and the right people can be notified.
In an article published to CNN on April 26th, 2024, Zachary Cohen and Sean Lyngass reported on a recent ransomware attack in Coffee County, Georgia. The attack hit computers on Coffee County's IT Infrastructure, forcing the county to temporarily sever its connections to GARViS, the state's voting system. The attack was first reported to the state by the federal Cybersecurity and Infrastructure Security Agency (CISA), and while the connection has since been restored, investigators are still trying to find the source behind the attack. This article comes from a national news source that draws on an earlier news break from Cyberscoop, and local news sources have also reported on it.
While ransomware attacks aren't that common for individuals, they are a more notable threat to large organizations and computer networks. In the event of a ransomware attack, the affected computers should be isolated from the network and all of their data should be erased. Recent backups can be used to restore the computer's data afterwards.