Archive for the ‘Blog’ Category

The Cracks in Your Network that Could Turn into Gaping Holes

Monday, April 10th, 2017

We often talk about hackers who breach networks and completely shut them down or steal personal information, but if every hack was that damaging most people would have sworn off technology by now. Even though every week we hear about another company that’s had a breach that will cost them millions, there are thousands of […]

The Best Thing to Happen to Hospitals in the Last Year?

Thursday, April 6th, 2017

It’s no secret that 2016 was a rough year for cybersecurity in the medical field. 21st century Oncology leaked 2.2 million patients’ information. Premier Healthcare lost unencrypted records for 200,00 patients. Hollywood Presbyterian Medical center shelled out $17,000 after a ransomware attack. And just to name a few. But when we look back on 2016, […]

Don’t Get Caught Off Guard with PCI DSS Compliance

Monday, April 3rd, 2017

There are a ton of people out there who hear about hacking and assume that since they’re an average person at a small company, they’ll never have to worry about cybercrime. In their mind, as long as they protect their identity online and cancel any lost credit cards they’ll never have to deal with the […]

Cybercrime’s Next Target

Thursday, March 30th, 2017

The good news: cyberattacks on healthcare organizations have dropped. The bad news: cybercriminals have a new target. The information comes from figures released from IBM’s X-Force Thread Intelligence Index, which shows that healthcare cyberattacks peaked in 2015. It’s still a major target, but as larger organizations are increasing their security, attacks have turned to smaller […]

Updated Ransomware Plays Hide and Seek

Thursday, March 30th, 2017

Cerber is one of the more popular variations of ransomware. A new version has been detected, and it has a few new tricks up its sleeve. The latest version of Cerber extracts itself from a hacker-owned Dropbox account. The self-extraction makes it look safe to machine-learning tools, which is one way it avoids detection. It also checks […]

Wikileaks Dump Shows iPhone Vulnerabilities Exploited by CIA

Thursday, March 30th, 2017

WikiLeaks’ DarkMatter dump brought some interesting revelations to light, most notably was the fact that the CIA has been working with Apple since 2008, a mere year after its release, to hack the iPhone. One such example of this is the malware entitled “NightSkies,” a virus that would allow the hacker to have full control […]

New Kind Ransomware, Scareware, on Safari

Tuesday, March 28th, 2017

Have you ever gotten a popup window while using Safari on your iPhone or iPad, telling you that you have to pay a fee to regain access to your browser? Leaving aside any judgment on the kinds of websites or online activities you that are usually involved that result in getting it, if you’ve seen […]

A Cybersecurity Storm Is Hammering Your Roof. Will You Find The Leaks Before It’s Too Late?

Monday, March 27th, 2017

There’s a cybersecurity storm hammering your roof, will you find and fix the leaks in your network before they cause major damage? If you’re a homeowner, then you know that leaks are inevitable. No matter what you do your roof is going to have some soft spots due to simple wear and tear. If there’s […]

Cloud Computing: The Fall of Hospital Datacenters

Thursday, March 23rd, 2017

Hospital datacenters could go the way of rotary phones and VCRs in the very near future, as brick and mortar make way for the cheaper and more convenient cloud. John Halamka, MD, CIO of Count Beth Israel Deaconess Medical Center predicts that the centers could become obsolete within the next five years, stating that the […]

iPhone Users Double-Victimized

Thursday, March 23rd, 2017

iPhone thieves may be able to pick up an iPhone, but thanks to “Find my iPhone,” breaking into them is such a headache.   However, where there is a will, there is a way. A scam was recently discovered: one that involves stealing the victim’s Apple iCloud username and password after the theft of the […]

Restaurants Easy Targets for Credit Card Fraud

Thursday, March 23rd, 2017

Google algorithms helped identify the source of a massive credit card breach – for the second time in just nine months, with its big “This site may be hacked” warning. And oddly enough, the source of both breaches?  Restaurants chains. Restaurants use Point of Sale (POS) terminals in their businesses to help track items such […]

Cybersecurity Firm Newest Phishing Victim

Thursday, March 23rd, 2017

You think only “regular” citizens can fall victim to tax phishing scams?  Think again. Last Thursday, George McKenzie, the CEO of VA-based cybersecurity firm Defense Point Security, LLC, informed its employees that all of their W-2 information was compromised after a fellow co-worker was ensnared in a hacker’s phishing “net.”  This data included such personal […]

Stolen Secret Service Laptop

Thursday, March 23rd, 2017

A perpetrator, whose identity is still unknown (despite being caught on surveillance tapes), nabbed a Secret Service agent’s agency-issued laptop from the agent’s vehicle on Thursday in New York City, as well as an official Secret Service lapel pin.   While the laptop itself did not contain sensitive information, if the thief also happens to […]

Threat to 300 Million iPhone Users

Wednesday, March 22nd, 2017

A hacker group called the Turkish Crime Family is demanding $75,000 in cyrptocurrency or $100,000 in iTunes gift cards from Apple.  They claim to have access to 300 million iCloud accounts and say they’ll wipe all those accounts clean if Apple doesn’t pony up. A screenshot of a conversation between the hacker group and the […]

FBI and IRS Alert: W2 Phishing Scams

Tuesday, March 21st, 2017

Tax season is upon us, but procrastinators and tax consultants aren’t the only people who are busy this time of year.  More and more, this is a busy season for criminals who want to cash in on your tax return. An increasingly popular technique is to spoof a CEO’s email to steal a company’s employee’s […]

What Does Minecraft Have to Do with State Hackers?

Monday, March 20th, 2017

Let’s face it, state-sponsored hackers are scary. They have the knowledge and resources wreak havoc on governments and individual citizens alike. Take the Dyn DDoS hack that happened last fall. Dyn is an internet performance management company that provides internet infrastructure, so when they were hit by a large DDoS attack that shut down their […]

Hackers Charged in Yahoo Breach

Thursday, March 16th, 2017

The theft of half a billion Yahoo user accounts has been well-documented.  Not only has it affected users, it’s also caused problems with Yahoo’s attempted buyout to Verizon.  Some scoffed when Yahoo mentioned being hacked by state-sponsored hackers, but now it appears there’s some validity to that claim.  The US Justice Department revealed an indictment […]

The Five W’s of the WikiLeaks CIA Dump

Wednesday, March 15th, 2017

Who: WikiLeaks is a self-proclaimed “stateless news organization” that is led by Julian Assange.  The website became infamous in June 2013 when Edward Snowden, an NSA contractor, leaked secret NSA surveillance documents proving that the government agency does in fact illegally monitor its citizens. It is believed that the person who leaked the CIA files […]

Cloud Vulnerabilities Revealed in Amazon Outage

Wednesday, March 15th, 2017

On Tuesday, February 28, 2017, Amazon Web Services’ (AWS) Simple Storage System (S3) – a service used by hundreds of thousands of websites – went down and stayed down for most of the day.   Unfortunately, the outage impacted millions of people, including Nest “smart” thermostat users, who were unable to manage or receive alerts […]

Verizon Wants Big Yahoo Discount

Tuesday, March 14th, 2017

Poor Yahoo.  Once an internet giant, there is an ongoing attempt to sell it off to Verizon, but the search engine and news outlet continues to get dinged by reports of massive data theft from various hacks. Verizon is still interested in the purchase, but according to a SEC filing, they are looking to get […]