Archive for the ‘Blog’ Category
Monday, April 10th, 2017
We often talk about hackers who breach networks and completely shut them down or steal personal information, but if every hack was that damaging most people would have sworn off technology by now. Even though every week we hear about another company that’s had a breach that will cost them millions, there are thousands of […]
Posted in Blog, Cyber Security | Comments Off on The Cracks in Your Network that Could Turn into Gaping Holes
Thursday, April 6th, 2017
It’s no secret that 2016 was a rough year for cybersecurity in the medical field. 21st century Oncology leaked 2.2 million patients’ information. Premier Healthcare lost unencrypted records for 200,00 patients. Hollywood Presbyterian Medical center shelled out $17,000 after a ransomware attack. And just to name a few. But when we look back on 2016, […]
Posted in Blog, Cyber Security | Comments Off on The Best Thing to Happen to Hospitals in the Last Year?
Monday, April 3rd, 2017
There are a ton of people out there who hear about hacking and assume that since they’re an average person at a small company, they’ll never have to worry about cybercrime. In their mind, as long as they protect their identity online and cancel any lost credit cards they’ll never have to deal with the […]
Posted in Blog, Cyber Security | Comments Off on Don’t Get Caught Off Guard with PCI DSS Compliance
Thursday, March 30th, 2017
The good news: cyberattacks on healthcare organizations have dropped. The bad news: cybercriminals have a new target. The information comes from figures released from IBM’s X-Force Thread Intelligence Index, which shows that healthcare cyberattacks peaked in 2015. It’s still a major target, but as larger organizations are increasing their security, attacks have turned to smaller […]
Posted in Blog, Cyber Security | Comments Off on Cybercrime’s Next Target
Thursday, March 30th, 2017
Cerber is one of the more popular variations of ransomware. A new version has been detected, and it has a few new tricks up its sleeve. The latest version of Cerber extracts itself from a hacker-owned Dropbox account. The self-extraction makes it look safe to machine-learning tools, which is one way it avoids detection. It also checks […]
Posted in Blog, Cyber Security | Comments Off on Updated Ransomware Plays Hide and Seek
Thursday, March 30th, 2017
WikiLeaks’ DarkMatter dump brought some interesting revelations to light, most notably was the fact that the CIA has been working with Apple since 2008, a mere year after its release, to hack the iPhone. One such example of this is the malware entitled “NightSkies,” a virus that would allow the hacker to have full control […]
Posted in Blog, Cyber Security | Comments Off on Wikileaks Dump Shows iPhone Vulnerabilities Exploited by CIA
Tuesday, March 28th, 2017
Have you ever gotten a popup window while using Safari on your iPhone or iPad, telling you that you have to pay a fee to regain access to your browser? Leaving aside any judgment on the kinds of websites or online activities you that are usually involved that result in getting it, if you’ve seen […]
Posted in Blog, Cyber Security | Comments Off on New Kind Ransomware, Scareware, on Safari
Monday, March 27th, 2017
There’s a cybersecurity storm hammering your roof, will you find and fix the leaks in your network before they cause major damage? If you’re a homeowner, then you know that leaks are inevitable. No matter what you do your roof is going to have some soft spots due to simple wear and tear. If there’s […]
Posted in Blog, Cyber Security | Comments Off on A Cybersecurity Storm Is Hammering Your Roof. Will You Find The Leaks Before It’s Too Late?
Thursday, March 23rd, 2017
Hospital datacenters could go the way of rotary phones and VCRs in the very near future, as brick and mortar make way for the cheaper and more convenient cloud. John Halamka, MD, CIO of Count Beth Israel Deaconess Medical Center predicts that the centers could become obsolete within the next five years, stating that the […]
Posted in Blog | Comments Off on Cloud Computing: The Fall of Hospital Datacenters
Thursday, March 23rd, 2017
iPhone thieves may be able to pick up an iPhone, but thanks to “Find my iPhone,” breaking into them is such a headache. However, where there is a will, there is a way. A scam was recently discovered: one that involves stealing the victim’s Apple iCloud username and password after the theft of the […]
Posted in Blog, Cyber Security | Comments Off on iPhone Users Double-Victimized
Thursday, March 23rd, 2017
Google algorithms helped identify the source of a massive credit card breach – for the second time in just nine months, with its big “This site may be hacked” warning. And oddly enough, the source of both breaches? Restaurants chains. Restaurants use Point of Sale (POS) terminals in their businesses to help track items such […]
Posted in Blog, Cyber Security | Comments Off on Restaurants Easy Targets for Credit Card Fraud
Thursday, March 23rd, 2017
You think only “regular” citizens can fall victim to tax phishing scams? Think again. Last Thursday, George McKenzie, the CEO of VA-based cybersecurity firm Defense Point Security, LLC, informed its employees that all of their W-2 information was compromised after a fellow co-worker was ensnared in a hacker’s phishing “net.” This data included such personal […]
Posted in Blog, Cyber Security | Comments Off on Cybersecurity Firm Newest Phishing Victim
Thursday, March 23rd, 2017
A perpetrator, whose identity is still unknown (despite being caught on surveillance tapes), nabbed a Secret Service agent’s agency-issued laptop from the agent’s vehicle on Thursday in New York City, as well as an official Secret Service lapel pin. While the laptop itself did not contain sensitive information, if the thief also happens to […]
Posted in Blog, Cyber Security | Comments Off on Stolen Secret Service Laptop
Wednesday, March 22nd, 2017
A hacker group called the Turkish Crime Family is demanding $75,000 in cyrptocurrency or $100,000 in iTunes gift cards from Apple. They claim to have access to 300 million iCloud accounts and say they’ll wipe all those accounts clean if Apple doesn’t pony up. A screenshot of a conversation between the hacker group and the […]
Posted in Blog, Cyber Security | Comments Off on Threat to 300 Million iPhone Users
Tuesday, March 21st, 2017
Tax season is upon us, but procrastinators and tax consultants aren’t the only people who are busy this time of year. More and more, this is a busy season for criminals who want to cash in on your tax return. An increasingly popular technique is to spoof a CEO’s email to steal a company’s employee’s […]
Posted in Blog, Cyber Security | Comments Off on FBI and IRS Alert: W2 Phishing Scams
Monday, March 20th, 2017
Let’s face it, state-sponsored hackers are scary. They have the knowledge and resources wreak havoc on governments and individual citizens alike. Take the Dyn DDoS hack that happened last fall. Dyn is an internet performance management company that provides internet infrastructure, so when they were hit by a large DDoS attack that shut down their […]
Posted in Blog, Cyber Security | 1 Comment »
Thursday, March 16th, 2017
The theft of half a billion Yahoo user accounts has been well-documented. Not only has it affected users, it’s also caused problems with Yahoo’s attempted buyout to Verizon. Some scoffed when Yahoo mentioned being hacked by state-sponsored hackers, but now it appears there’s some validity to that claim. The US Justice Department revealed an indictment […]
Posted in Blog, Cyber Security | Comments Off on Hackers Charged in Yahoo Breach
Wednesday, March 15th, 2017
Who: WikiLeaks is a self-proclaimed “stateless news organization” that is led by Julian Assange. The website became infamous in June 2013 when Edward Snowden, an NSA contractor, leaked secret NSA surveillance documents proving that the government agency does in fact illegally monitor its citizens. It is believed that the person who leaked the CIA files […]
Posted in Blog, Cyber Security | Comments Off on The Five W’s of the WikiLeaks CIA Dump
Wednesday, March 15th, 2017
On Tuesday, February 28, 2017, Amazon Web Services’ (AWS) Simple Storage System (S3) – a service used by hundreds of thousands of websites – went down and stayed down for most of the day. Unfortunately, the outage impacted millions of people, including Nest “smart” thermostat users, who were unable to manage or receive alerts […]
Posted in Blog, Cyber Security | Comments Off on Cloud Vulnerabilities Revealed in Amazon Outage
Tuesday, March 14th, 2017
Poor Yahoo. Once an internet giant, there is an ongoing attempt to sell it off to Verizon, but the search engine and news outlet continues to get dinged by reports of massive data theft from various hacks. Verizon is still interested in the purchase, but according to a SEC filing, they are looking to get […]
Posted in Blog, Cyber Security | Comments Off on Verizon Wants Big Yahoo Discount
Page 10 of 22« First«...89101112...»Last »