Archive for 2016
Wednesday, July 27th, 2016
A password cracking specialist has built a beast of a computer that has the ability to attempt upwards of 350 billion passwords a second. For those of you keeping count, this means it can guess every possible Windows password within six hours. The Linux-based machine has five servers and utilizes the Virtual OpenCL cluster platform […]
Posted in Blog, Cyber Security | Comments Off on Every Windows Password Can be Cracked Within Six Hours
Wednesday, July 27th, 2016
If you are using a cheap wireless keyboard, you run the risk of having your passwords stolen. According to researchers at the security company, Bastille, there’s a security hole in millions of keyboards that can allow hackers see every keystroke from up to 100 meters away. After testing wireless keyboards put out by a dozen […]
Posted in Blog, Cyber Security | Comments Off on Stolen Passwords from Wireless Keyboards
Wednesday, July 27th, 2016
Millions of people use LastPass to store passwords for all their various accounts. It’s a great idea, because it can be difficult to come up with different, strong passwords, never mind memorizing them for each website you log into. Unfortunately, a zero day vulnerability has been discovered in LastPass’s cloud vault. A zero day vulnerability […]
Posted in Blog, Cyber Security | Comments Off on LastPass Vulnerability Could Give Hackers All Your Passwords
Tuesday, July 26th, 2016
WikiLeaks’ crusade of radical transparency is in some respects a noble one, but there are occasions when innocent people are affected. The release of over 19,000 emails from top US Democratic National Committee members is one of those occasions. Included in the correspondence is personal donor information that includes names, home and email addresses, phone, […]
Posted in Blog, Cyber Security | Comments Off on Innocent Bystanders of DNC WikiLeak
Tuesday, July 26th, 2016
According to the Health and Human Services Office for the Inspector General (OIG), in 2014 almost 60% of hospitals had an outage in their Electronic Health Records (EHR) and 25% of those say it delayed patient care. Of those outages, 20% lasted longer than eight hours with 15% having a negative impact on patient care […]
Posted in Blog, HIPAA | Comments Off on Electronic Health Record Outages
Tuesday, July 26th, 2016
As a result of the rash of hacking, ransomware and data breaches in recent years, information security professionals are in high demand. According to the US Bureau of Labor Statistics, there will be an 18% increase in information security analyst positions between 2014 and 2024. This expected growth far exceeds that of other occupations, even […]
Posted in Blog, Cyber Security, Technology | Comments Off on Security Analyst Jobs
Tuesday, July 26th, 2016
According to a recent two-year study of hospitals and other organizations related to the healthcare industry, medical facilities on the whole are woefully unprepared to the threat of increasingly more sophisticated hackers. More specifically, their defense is focused almost exclusively on protecting patient records and is typically reactionary rather than proactive. What defenses that are […]
Posted in Blog, Cyber Security | Comments Off on 5 Concerns of Healthcare Executives
Tuesday, July 26th, 2016
If you’ve been using two-factor authentication, you’re very used to online services sending you a code via text to verify changes to your account. Hopefully you aren’t in love with that particular security measure, because it’s about to go the way of the dodo. The US National Institute for Standards and Technology says in the most […]
Posted in Blog, Cyber Security | Comments Off on Say Goodbye to Two-Factor Authentication Texts
Tuesday, July 26th, 2016
As our recent blog stated, almost 20,000 DNC emails were posted by WikiLeaks on Friday, and it was believed to have been compromised by Russian hackers. Details are coming to light, however, that the breach may not have been committed by just any Russian hackers, but by hackers commissioned by the Russian government in order to […]
Posted in Blog, Cyber Security | Comments Off on Is Trump to Blame for the Recent DNC Leaks?
Monday, July 25th, 2016
What is the definition of irony? Writing an email that mocks a news report, questioning your cybersecurity, just two months before your system is hacked, and said email is mass-leaked to the media. Cue up the Democratic National Committee (DNC). Almost 20,000 emails from seven senior DNC staff members (sent between January of last year […]
Posted in Blog, Cyber Security | Comments Off on Leaked DNC Email Thumbs Nose at Article Questioning DNC Cybersecurity
Saturday, July 23rd, 2016
Now that Lindsay Mills has reunited with her exiled boyfriend, Edward Snowden, in Russia, the NSA whistleblower blower seems to be content. But after his announcement yesterday, we can see that there might be one other little aspect of his life that he is missing from his pre-leaking days; something that would be missing from […]
Posted in Blog, Cyber Security | Comments Off on Snowden Unveils Device to Help Keep Phone Secure
Friday, July 22nd, 2016
You may have heard about the Locky strain of ransomware due to it being one of the most pervasive brands of malware. Its success rate is due in no small part to it being constantly updated and recently it got a new one: it can encrypt files when a computer is offline. Previously, Locky worked by […]
Posted in Blog, Cyber Security | Comments Off on Offline Locky
Friday, July 22nd, 2016
We all remember the dispute Apple and the FBI had over unlocking the phone of one of the shooters in the San Bernardino terrorist attack. Authorities have found a new way to get around all that using a new technique: 3D printing fingerprints. Michigan police recently approached professors at the University of Michigan to see […]
Posted in Blog, Cyber Security | Comments Off on Police 3D Print Fingerprint to Unlock Phone
Friday, July 22nd, 2016
By now people should know not to jump on untrusted Wi-Fi networks, but unfortunately there are a lot of people who either still do it. In order to test this out, security researchers at Avast Software went to the Republican National Convention and set up a series of fake Wi-Fi networks. Despite opening themselves up […]
Posted in Blog, Cyber Security | Comments Off on Fake Wifi Networks at the RNC
Wednesday, July 20th, 2016
Oregon Health and Science University (OHSU) was accused of violating two HIPAA data breaches involving protected health information (PHI). The first breach revolved around a stolen laptop. The second breach occurred when OHSU contracted cloud storage usage without securing a business associate agreement. Although these violations have not yet caused harm to any OHSU patients, […]
Posted in Blog, HIPAA | Comments Off on OHSU Agrees to Pay $2.7 Million in HIPAA Fines
Wednesday, July 20th, 2016
If you are an iPhone owner who felt smug last Summer after learning that Stagefright bugs were found to be silently spying on almost a billion Android devices, you may want to consider hiding that smile of yours before your Android brethren read this article… Tyler Bohan, a senior security researcher at Cisco Talos, released […]
Posted in Blog, Cyber Security | Comments Off on Update iPhone ASAP to Avoid Being a Victim
Tuesday, July 19th, 2016
ATTENTION: New Pokescams Exploiting Pokeman Go Gamers In case you were hiding out in the far reaches of Siberia or have been deep-sea fishing for crabs in Alaska, you have probably heard of the newest Pokémon craze sweeping the globe, called “Pokémon Go.” And in case you do not have children, or are not among […]
Posted in Blog, Cyber Security | Comments Off on Pokéscam Go
Thursday, July 14th, 2016
What happens when ransomware developers combine two already-aggressive viruses into one Mega Strain? Satana. Satana is the Italian word for Satan, and the title is apropos. It is a devastating two-step combination of malware-strain, Petya, and ransomware, Mischa. And though the two have a shared history, with Mischa playing backup in case Petya fails, it […]
Posted in Blog, Cyber Security | Comments Off on New Satana Malware
Wednesday, July 13th, 2016
Unfortunately for medical practices the transition and reliance on digital patient records have brought with it a new set of problems. Between hackers stealing patient data or holding it for ransom with ransomware and the increased chances of a HIPAA audit, smaller medical practices run the risk of being forced to close down. In 2011, […]
Posted in Blog, Cyber Security, HIPAA | Comments Off on HIPAA Audits and Ransomware
Wednesday, July 13th, 2016
If your computer is supported by Windows Vista or any later version (including the most recent one, Windows 10), do not postpone your next Microsoft update. The software behemoth announced yesterday that its next monthly security update will include a patch for a “critical” flaw that, if exploited, would allow a hacker to take control […]
Posted in Blog, Cyber Security | Comments Off on Update Windows ASAP
Page 7 of 10« First«...56789...»Last »