Archive for July, 2016

Don’t Let Your Business be a Target

Thursday, July 28th, 2016

Many small business owners are living in the past, and it is to their detriment. That is because over the last four years, hackers have begun to increase their attacks on small businesses exponentially. In fact, the number of attacks actually tripled from 2011 to 2012, and there has been a sharp increase even in […]

Biometrics: Convenience or Risk?

Thursday, July 28th, 2016

When Apple first came out with its Touch ID on the iPhone 5, it was like owning a piece of the future. The popularity of biometrics (using a person’s unique attributes for identification purposes, such as fingerprints and retinas) has been quickly increasing; in fact, it is estimated that biometrics will grow into a $25 […]

Every Windows Password Can be Cracked Within Six Hours

Wednesday, July 27th, 2016

A password cracking specialist has built a beast of a computer that has the ability to attempt upwards of 350 billion passwords a second. For those of you keeping count, this means it can guess every possible Windows password within six hours. The Linux-based machine has five servers and utilizes the Virtual OpenCL cluster platform […]

Stolen Passwords from Wireless Keyboards

Wednesday, July 27th, 2016

If you are using a cheap wireless keyboard, you run the risk of having your passwords stolen. According to researchers at the security company, Bastille, there’s a security hole in millions of keyboards that can allow hackers see every keystroke from up to 100 meters away. After testing wireless keyboards put out by a dozen […]

LastPass Vulnerability Could Give Hackers All Your Passwords

Wednesday, July 27th, 2016

Millions of people use LastPass to store passwords for all their various accounts.  It’s a great idea, because it can be difficult to come up with different, strong passwords, never mind memorizing them for each website you log into.  Unfortunately, a zero day vulnerability has been discovered in LastPass’s cloud vault. A zero day vulnerability […]

Innocent Bystanders of DNC WikiLeak

Tuesday, July 26th, 2016

WikiLeaks’ crusade of radical transparency is in some respects a noble one, but there are occasions when innocent people are affected. The release of over 19,000 emails from top US Democratic National Committee members is one of those occasions. Included in the correspondence is personal donor information that includes names, home and email addresses, phone, […]

Electronic Health Record Outages

Tuesday, July 26th, 2016

According to the Health and Human Services Office for the Inspector General (OIG), in 2014 almost 60% of hospitals had an outage in their Electronic Health Records (EHR) and 25% of those say it delayed patient care. Of those outages, 20% lasted longer than eight hours with 15% having a negative impact on patient care […]

Security Analyst Jobs

Tuesday, July 26th, 2016

As a result of the rash of hacking, ransomware and data breaches in recent years, information security professionals are in high demand. According to the US Bureau of Labor Statistics, there will be an 18% increase in information security analyst positions between 2014 and 2024. This expected growth far exceeds that of other occupations, even […]

5 Concerns of Healthcare Executives

Tuesday, July 26th, 2016

According to a recent two-year study of hospitals and other organizations related to the healthcare industry, medical facilities on the whole are woefully unprepared to the threat of increasingly more sophisticated hackers. More specifically, their defense is focused almost exclusively on protecting patient records and is typically reactionary rather than proactive. What defenses that are […]

Say Goodbye to Two-Factor Authentication Texts

Tuesday, July 26th, 2016

If you’ve been using two-factor authentication, you’re very used to online services sending you a code via text to verify changes to your account.  Hopefully you aren’t in love with that particular security measure, because it’s about to go the way of the dodo. The US National Institute for Standards and Technology says in the most […]

Is Trump to Blame for the Recent DNC Leaks?

Tuesday, July 26th, 2016

As our recent blog stated, almost 20,000 DNC emails were posted by WikiLeaks on Friday, and it was believed to have been compromised by Russian hackers. Details are coming to light, however, that the breach may not have been committed by just any Russian hackers, but by hackers commissioned by the Russian government in order to […]

Leaked DNC Email Thumbs Nose at Article Questioning DNC Cybersecurity

Monday, July 25th, 2016

What is the definition of irony? Writing an email that mocks a news report, questioning your cybersecurity, just two months before your system is hacked, and said email is mass-leaked to the media. Cue up the Democratic National Committee (DNC). Almost 20,000 emails from seven senior DNC staff members (sent between January of last year […]

Snowden Unveils Device to Help Keep Phone Secure

Saturday, July 23rd, 2016

Now that Lindsay Mills has reunited with her exiled boyfriend, Edward Snowden, in Russia, the NSA whistleblower blower seems to be content. But after his announcement yesterday, we can see that there might be one other little aspect of his life that he is missing from his pre-leaking days; something that would be missing from […]

Offline Locky

Friday, July 22nd, 2016

You may have heard about the Locky strain of ransomware due to it being one of the most pervasive brands of malware. Its success rate is due in no small part to it being constantly updated and recently it got a new one: it can encrypt files when a computer is offline. Previously, Locky worked by […]

Police 3D Print Fingerprint to Unlock Phone

Friday, July 22nd, 2016

We all remember the dispute Apple and the FBI had over unlocking the phone of one of the shooters in the San Bernardino terrorist attack. Authorities have found a new way to get around all that using a new technique: 3D printing fingerprints. Michigan police recently approached professors at the University of Michigan to see […]

Fake Wifi Networks at the RNC

Friday, July 22nd, 2016

By now people should know not to jump on untrusted Wi-Fi networks, but unfortunately there are a lot of people who either still do it. In order to test this out, security researchers at Avast Software went to the Republican National Convention and set up a series of fake Wi-Fi networks. Despite opening themselves up […]

OHSU Agrees to Pay $2.7 Million in HIPAA Fines

Wednesday, July 20th, 2016

Oregon Health and Science University (OHSU) was accused of violating two HIPAA data breaches involving protected health information (PHI). The first breach revolved around a stolen laptop. The second breach occurred when OHSU contracted cloud storage usage without securing a business associate agreement. Although these violations have not yet caused harm to any OHSU patients, […]

Update iPhone ASAP to Avoid Being a Victim

Wednesday, July 20th, 2016

If you are an iPhone owner who felt smug last Summer after learning that Stagefright bugs were found to be silently spying on almost a billion Android devices, you may want to consider hiding that smile of yours before your Android brethren read this article… Tyler Bohan, a senior security researcher at Cisco Talos, released […]

Pokéscam Go

Tuesday, July 19th, 2016

ATTENTION: New Pokescams Exploiting Pokeman Go Gamers In case you were hiding out in the far reaches of Siberia or have been deep-sea fishing for crabs in Alaska, you have probably heard of the newest Pokémon craze sweeping the globe, called “Pokémon Go.” And in case you do not have children, or are not among […]

New Satana Malware

Thursday, July 14th, 2016

What happens when ransomware developers combine two already-aggressive viruses into one Mega Strain? Satana. Satana is the Italian word for Satan, and the title is apropos. It is a devastating two-step combination of malware-strain, Petya, and ransomware, Mischa. And though the two have a shared history, with Mischa playing backup in case Petya fails, it […]