Archive for the ‘Blog’ Category
Wednesday, August 24th, 2016
Apparently the Russians really want Donald Trump to be the next President of the United States. The FBI, in tandem with other US security agencies, are investigating a number of security breaches that appear to be targeting the DNC, as well as certain news organizations, such as The New York Times. Email services for The […]
Posted in Blog, Cyber Security | Comments Off on Russian Spies Targeting News Organizations
Thursday, August 18th, 2016
In 2015, a startling statistic emerged when examining data security. Of all the compromised data as a result of data breaches, over 75% were due to stolen credentials. This should underline the importance of businesses securing privileged credential, particularly when using Microsoft Active Directory Services. Microsoft has released a set of guidelines for Credential Theft […]
Posted in Blog, Cyber Security | Comments Off on 75% of Data Breaches Could Easily be Prevented
Thursday, August 18th, 2016
Thanks to a data dump stolen from what most believe to be a shadowy arm of the NSA, Cisco is developing a patch for a serious zero-day vulnerability that would allow an attacker to control of its firewalls. While the code appears to be several years old, it still appears to be functional. This new […]
Posted in Blog, Cyber Security | Comments Off on Cisco Updates Thanks to NSA Hack
Thursday, August 18th, 2016
On numerous occasions we have warned about the threat of the Locky strain of ransomware, particularly in the healthcare industry. Now researchers at say FireEye that so far this month there have been some massive email campaigns spreading the malware. It would appear that based on the findings, the healthcare industry is once again the […]
Posted in Blog, Cyber Security | Comments Off on Healthcare Industry Main Target of Vicious Strain of Ransomware
Thursday, August 18th, 2016
Thanks to a data dump stolen from what most believe to be a shadowy arm of the NSA, Cisco is developing a patch for a serious zero-day vulnerability that would allow an attacker to control of its firewalls. While the code appears to be several years old, it still appears to be functional. This new […]
Posted in Blog, Cyber Security | Comments Off on NSA Exploiting Zero-Day Vulnerabilities?
Wednesday, August 17th, 2016
Yesterday we told you about a group of hackers calling themselves The Shadow Brokers auctioning off files they stole from a clandestine branch of the NSA called the Equation Group. The Equation Group was identified as part of the NSA thanks to files released by Edward Snowden, and now he’s speaking out about the hack. […]
Posted in Blog, Cyber Security | Comments Off on Snowden on the NSA Hack
Tuesday, August 16th, 2016
A new data breach targeting 20 US hotels operated by HEI Hotels & Resorts for Starwood, Marriott, Hyatt and Intercontinental has been uncovered. The customer financial data associated with tens of thousands of transactions has been compromised thanks to point-of-sale (PoS) malware. Discovered in June, the malware was found on PoS systems used at restaurants, […]
Posted in Blog, Cyber Security | Comments Off on Hack at Major Hotels
Tuesday, August 16th, 2016
According to a group of hackers going by the name The Shadow Brokers, they’ve being able to infiltrate and steal files from the Equation Group. If you don’t know what that is, it’s probably because the Equation Group is generally believed to be a branch of the National Security Agency. While not specifically saying the […]
Posted in Blog, Cyber Security | Comments Off on The Shadow Brokers and the NSA
Tuesday, August 16th, 2016
Researchers from the security firm Lookout have discovered another Android vulnerability that may affect 80% of Android devices. The flaw would allow hackers to terminate connections, or if those connections aren’t encrypted, they could inject malware into the victim’s communications. The vulnerability originated in version 3.6 of the Linux OS kernel back in 2012 and […]
Posted in Blog, Cyber Security | Comments Off on Vulnerability in 80% of Android Devices
Monday, August 15th, 2016
The Social Security Administration (SSA) has set a convenient online service called My SocialSecurity for retirees and others on social security to check their earnings history, benefits, change their address, or how they receive benefits. It even supports two-factor authentication. Unfortunately, scammers have also found two new ways to take advantage of the service and […]
Posted in Blog, Cyber Security | Comments Off on My Social Security Scam
Monday, August 15th, 2016
Picture this: You want to check something from your doctor, so you log into your medical portal to see your health information; only, instead of seeing your information, you see the data from another person. Of course you are going to wonder, “Does that mean someone can see mine as well?” This exact scenario has […]
Posted in Blog, Cyber Security, HIPAA | Comments Off on Tiny Bug, Huge HIPAA Impact
Monday, August 15th, 2016
As previously reported, the latest trend in hacking is still on the rise in which hackers are foregoing big companies and targeting the small guy. As BlackHatters have become more sophisticated, so, too, have their earliest victims – larger businesses and financial institutions. While that was good news to smaller businesses, it, unfortunately also caused […]
Posted in Blog, Cyber Security | Comments Off on New Scam Continues to Follow Small Business Trend by Hackers
Thursday, August 11th, 2016
Apple has been ignoring FBI requests for creating backdoor security bypass that would allow “good guys” to access devices with a “Golden Key.” Being extremely security-conscious, Apple CEO Tim Cook politely, yet firmly, refused the request as too dangerous to comply with. And Microsoft’s backdoor blunder is making Apple look really smart. Unlike Apple, Microsoft […]
Posted in Blog, Cyber Security | Comments Off on Microsoft Encryption Leak Makes Apple Look Wise
Thursday, August 11th, 2016
Hacking a Phone with Screen Mirroring Video Jacking – Defined. Screen mirroring is a pretty underused feature on most smartphones. Essentially, it allows someone to cast a duplicate video from their phone’s screen to a larger screen like a television. Unfortunately, as it turns out, it’s also a pretty easy way to steal personal information […]
Posted in Blog, Cyber Security | Comments Off on Video Jacking
Thursday, August 11th, 2016
In 2013, University of Birmingham researchers discovered a flaw that would allow thieves to start the ignition of millions of Volkswagens without needing a key. Volkswagen sued them. That delayed the release of their work for two years. Now those same researchers have found two new flaws in the keyless entry system that affects virtually […]
Posted in Blog, Cyber Security | Comments Off on A New High-Tech Way to Steal Volkswagens
Wednesday, August 10th, 2016
In the month of July, one hacker going by the handle TheDarkOverlord made up 30% of all data breaches. He also had the largest breach with 23,565 records being put on the Dark Web for sale. Even more surprising is that on average it took two years before a breach was reported, and in one […]
Posted in Blog, Cyber Security | Comments Off on Recent Staggering Healthcare Data Breach Numbers
Tuesday, August 9th, 2016
A new type of malware has been discovered by researchers that is so advanced it probably was developed by a nation-state and has been active for years without anyone noticing. Going by both ProjectSauron and Remsec depending on who you talk to, the malware platform has been around since at least 2011 and has affected […]
Posted in Blog, Cyber Security | Comments Off on Advanced Malware, ProjectSauron, Undetected for Years
Monday, August 8th, 2016
One of the providers of insurance ID cards for carriers such as BlueCross BlueShield, Newkirk Products, has been the victim of a data breach. While no health plan systems were affected, the personal data of 3.3 million insurance plan members may have been exposed. Newkirk discovered that one of their servers had been accessed without […]
Posted in Blog, Cyber Security | Comments Off on 3.3 Million Victims in BCBS Associate Hack
Monday, August 8th, 2016
The software company Oracle has become the latest victim of a Russian organized cybercriminals. The hackers have found a way to compromise the customer support portal for hundreds of Oracle’s MICROS point-of-sale (PoS) credit card payment systems. Servicing over 330,000 cash registers, MICROS is one of the top PoS in the world. With the breach […]
Posted in Blog, Cyber Security | Comments Off on Oracle Data Breach
Monday, August 8th, 2016
If you see a penny pick it up. If you see a USB device, throw it away! Or at the very least, DO NOT STICK IT IN YOUR COMPUTER!! USB sticks are the easiest way for hackers to get malware on your computer. Elie Bursztein, a Google anti-abuse team researcher, recently conducted a study in […]
Posted in Blog, Cyber Security | Comments Off on About that USB Drive You Found…